A survey of intrusion detection for in-vehicle networks

W Wu, R Li, G Xie, J An, Y Bai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The development of the complexity and connectivity of modern automobiles has caused a
massive rise in the security risks of in-vehicle networks (IVNs). Nevertheless, existing IVN …

Identity-aware convolutional neural network for facial expression recognition

Z Meng, P Liu, J Cai, S Han… - 2017 12th IEEE …, 2017 - ieeexplore.ieee.org
Facial expression recognition suffers under realworldconditions, especially on unseen
subjects due to highinter-subject variations. To alleviate variations introduced bypersonal …

[HTML][HTML] A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors

S Ndichu, S Kim, S Ozawa, T Misu, K Makishima - Applied Soft Computing, 2019 - Elsevier
Websites attract millions of visitors due to the convenience of services they offer, which
provide for interesting targets for cyber attackers. Most of these websites use JavaScript (JS) …

U-pot: A honeypot framework for upnp-based iot devices

MA Hakim, H Aksu, AS Uluagac… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
The ubiquitous nature of the IoT devices has brought serious security implications to its
users. A lot of consumer IoT devices have little to no security implementation at all, thus …

[HTML][HTML] Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots

M Akiyama, T Yagi, T Yada, T Mori, Y Kadobayashi - Computers & Security, 2017 - Elsevier
Today, websites are exposed to various threats that exploit their vulnerabilities. A
compromised website will be used as a stepping-stone and will serve attackers' evil …

Detecting malicious websites by learning IP address features

D Chiba, K Tobe, T Mori, S Goto - 2012 IEEE/IPSJ 12th …, 2012 - ieeexplore.ieee.org
Web-based malware attacks have become one of the most serious threats that need to be
addressed urgently. Several approaches that have attracted attention as promising ways of …

Malicious URL sequence detection using event de-noising convolutional neural network

T Shibahara, K Yamanishi, Y Takata… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
Attackers have increased the number of infected hosts by redirecting users of compromised
popular websites toward websites that exploit vulnerabilities of a browser and its plugins. To …

A machine learning approach to malicious JavaScript detection using fixed length vector representation

S Ndichu, S Ozawa, T Misu… - 2018 International Joint …, 2018 - ieeexplore.ieee.org
To add more functionality and enhance usability of web applications, JavaScript (JS) is
frequently used. Even with many advantages and usefulness of JS, an annoying fact is that …

Automating URL blacklist generation with similarity search approach

B Sun, M Akiyama, T Yagi, M Hatada… - … on Information and …, 2016 - search.ieice.org
Modern web users may encounter a browser security threat called drive-by-download
attacks when surfing on the Internet. Drive-by-download attacks make use of exploit codes to …

[HTML][HTML] HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle

M Akiyama, T Yagi, T Hariu, Y Kadobayashi - International Journal of …, 2018 - Springer
A web user who falsely accesses a compromised website is usually redirected to an
adversary's website and is forced to download malware after being exploited. Additionally …