Yasutaka Shindo

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A web-based attack, drive-by download attack, has been posing serious threats to Internet users. There are code analysis based methods and rule-based methods as countermeasures against drive-by download attacks. However, code analysis based methods require high analytical costs. Also, rule-based methods have difficulty in forming comprehensive detection(More)
At the early phase of the Great East Japan Earthquake a vast number of tweets were made on Twitter. Even though many of them were calling for emergency rescue, they were not found timely due to the vast number of tweets including wellintentioned tweets to support those emergency rescues. In order to deal with the situation, the authors developed and(More)
  • 1