Yasutaka Shindo

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A web-based attack, drive-by download attack, has been posing serious threats to Internet users. There are code analysis based methods and rule-based methods as countermeasures against drive-by download attacks. However, code analysis based methods require high analytical costs. Also, rule-based methods have difficulty in forming comprehensive detection(More)
At the early phase of the Great East Japan Earthquake a vast number of tweets were made on Twitter. Even though many of them were calling for emergency rescue , they were not found timely due to the vast number of tweets including well-intentioned tweets to support those emergency rescues. In order to deal with the situation, the authors developed and(More)
  • 1