-
Chapter and Conference Paper
Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs Detection
In order to compare the performance of the malicious URLs detection method, researches used the F-score or other detection accuracy to evaluate, but there are some difficulties in evaluating the URL embedding ...
-
Chapter and Conference Paper
Analysis and Risk Consideration of Worldwide Cyber Incidents Related to Cryptoassets
Cryptoassets are exposed to a variety of cyber attacks, including exploit vulnerabilities in blockchain technology and transaction systems, in addition to traditional cyber attacks. To mitigate incidents relat...
-
Chapter and Conference Paper
A Secure Contact Tracing Method Using Smart Contracts with Considering Privacy
Contact tracing, which uses smartphones to track the behavioral history of device owners, is used for infection control and crime control. On the other hand, contact tracing collects personal information, such...
-
Article
A study on robustness of malware detection model
In recent years, machine learning–based techniques are used to prevent cyberattacks caused by malware, and special attention is paid to the risks posed by such systems. However, there are relatively few studie...
-
Chapter and Conference Paper
Ethereum Contract Honeypot Risk Analysis
In recent years, smart contracts on the Ethereum platform have attracted considerable attention, and smart contracts have increasingly become targets of cyberattacks for the purpose of stealing cryptoassets. O...
-
Chapter and Conference Paper
Automatic Monitoring System for Security Using IoT Devices and Smart Contracts
With the recent technological advances in the design of IoT devices and their widespread use, it has become increasingly common for alarm services that provide security for facilities to use IoT devices. Howev...
-
Chapter and Conference Paper
Image Data Recoverability Against Data Collaboration and Its Countermeasure
The development machine learning and related techniques has accelerated the use of data in a variety of fields, including medicine, finance, and advertising. Because the amount of data is increasing extremely ...
-
Chapter and Conference Paper
Toward a Blockchain Healthcare Information Exchange
The introduction of healthcare information exchange (HIE) systems has been limited, although its compelling social need has been recognized. This could be due to medical institutions’ concerns about informatio...
-
Chapter and Conference Paper
Information Security Fatigue in Visually Impaired University Students
Information security measures for ICT users are always issues that must be considered. This may lead to a sense of mental exhaustion (information security fatigue) owing to the troublesome and time-consuming m...
-
Chapter and Conference Paper
Building a Blockchain-Based Social Network Identification System
With the rise of social network service (SNS) in recent years, the security of SNS users’ private information has been a concern for the public. However, due to the anonymity of SNS, identity impersonation is ...
-
Chapter and Conference Paper
Empirical Study of Software Adoption Process in the Bitcoin Network
Managing the flood of devices is a modern challenge in distributed networks as it is becoming increasingly difficult to manage the software updates needed to protect the devices from malicious attacks. Bitcoin...
-
Chapter and Conference Paper
Risk Analysis for Worthless Crypto Asset Networks
Blockchain technology has been used as the basis of crypto assets since the proposal of Bitcoin [8] by Satoshi Nakamoto, and new operation methods are being discussed every day. However, because of decentralizati...
-
Chapter and Conference Paper
Investigation and Analysis of Features in Decentralized Network Management of Minor Cryptocurrencies
Blockchain is a trustless interoperability platform for users and is managed in a decentralized structure. There are no controllers in this platform, and service continuity depends on the users present in the ...
-
Chapter and Conference Paper
Verifiable Functional Encryption Using Intel SGX
Most functional encryption schemes implicitly assume that inputs to decryption algorithms, i.e., secret keys and ciphertexts, are generated honestly. However, they may be tampered by malicious adversaries. Thu...
-
Chapter and Conference Paper
Toward Achieving Unanimity for Implicit Closings in a Trustless System
Blockchain, which has a decentralized management structure, is a technology that challenges conventional wisdom about the availability and durability of an unstable structure, because the network system is man...
-
Chapter and Conference Paper
Detecting Malicious Websites by Query Templates
With the development of the Internet, web content is exponentially increasing. Along with this, web-based attacks such as drive-by download attacks and phishing have grown year on year. To prevent such attacks...
-
Chapter
Bitcoin and Blockchain Technology
A can be defined as a “book of permanent record.” With modern information technology, data have become economic resources if they are associated with exclusive owners and put into a . It is shown in Chaps. 3
-
Chapter and Conference Paper
Threat Analysis of Poisoning Attack Against Ethereum Blockchain
In recent years, blockchain technology has witnessed remarkable developments in its application to crypto assets (cryptocurrency) considering not only function storing values but also extension of the smart c...
-
Chapter and Conference Paper
Safety Analysis of High-Dimensional Anonymized Data from Multiple Perspectives
Recently, large-scale data collection has driven data utilization in the medical, financial, advertising, and several other fields. This increasing use of data necessitates privacy risk considerations. K-anonymiz...
-
Chapter and Conference Paper
Difficulty of Decentralized Structure Due to Rational User Behavior on Blockchain
Blockchain is an autonomous decentralized system, the operation of which depends on the motivation of the users who provide the nodes for managing the accurate distributed ledger. For the management of an acc...