Mamoru Mimura
Orcid: 0000-0003-4323-9911
According to our database1,
Mamoru Mimura
authored at least 56 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Inf. Process., 2024
Internet Things, 2024
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism.
IEEE Access, 2024
Hybrid Input Model Using Multiple Features From Surface Analysis for Malware Detection.
IEEE Access, 2024
2023
Expert Syst. Appl., 2023
A Feasibility Study on Evasion Attacks Against NLP-Based Macro Malware Detection Algorithms.
IEEE Access, 2023
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Information Security Practice and Experience, 2023
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments.
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers.
J. Inf. Process., 2022
Evaluation of a cGAN Model and Random Seed Oversampling on Imbalanced JavaScript Datasets.
J. Inf. Process., 2022
Internet Things, 2022
Int. J. Inf. Sec., 2022
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection.
Proceedings of the Information Security Practice and Experience, 2022
An Attention Mechanism for Visualizing Word Weights in Source Code of PowerShell Samples: Experimental Results and Analysis.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022
2021
SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors.
Internet Things, 2021
Internet Things, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
2020
Using fake text vectors to improve the sensitivity of minority class for macro malware detection.
J. Inf. Secur. Appl., 2020
J. Inf. Secur. Appl., 2020
IEEE Access, 2020
Proceedings of the Advances in Information and Computer Security, 2020
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020
2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2010
Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic Patterns Using SCTP.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010