Yasuhiro TAKANO


A Malicious Web Site Identification Technique Using Web Structure Clustering
Tatsuya NAGAI Masaki KAMIZONO Yoshiaki SHIRAISHI Kelin XIA Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1665-1672
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
website structuremalicious websiteexploit kitclustering
 Summary | Full Text:PDF

Authentication Scheme Using Pre-Registered Information on Blockchain
Toshiki TSUCHIDA Makoto TAKITA Yoshiaki SHIRAISHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1676-1678
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
blockchainauthenticationInternet of Thingspseudo-random functionservice cooperation
 Summary | Full Text:PDF

Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
Shunta NAKAGAWA Tatsuya NAGAI Hideaki KANEHARA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1679-1682
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
CVECVSSConvolutional Neural Network
 Summary | Full Text:PDF

Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO Kenta NOMURA Masaki KAMIZONO Yoshiaki SHIRAISHI Yasuhiro TAKANO Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2658-2664
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Forensics and Risk Analysis
Keyword: 
diamond modelthreat intelligencecyber kill chainincident report
 Summary | Full Text:PDF