default search action
Mamoru Mimura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura:
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism. IEEE Access 12: 34477-34488 (2024) - [j21]Mamoru Mimura, Satoki Kanno:
Hybrid Input Model Using Multiple Features From Surface Analysis for Malware Detection. IEEE Access 12: 121198-121207 (2024) - [j20]Phung Minh Ngoc, Mamoru Mimura:
Malicious JavaScript Detection in Realistic Environments with SVM and MLP Models. J. Inf. Process. 32: 748-756 (2024) - [e1]Kazuhiko Minematsu, Mamoru Mimura:
Advances in Information and Computer Security - 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings. Lecture Notes in Computer Science 14977, Springer 2024, ISBN 978-981-97-7736-5 [contents] - 2023
- [j19]Mamoru Mimura, Risa Yamamoto:
A Feasibility Study on Evasion Attacks Against NLP-Based Macro Malware Detection Algorithms. IEEE Access 11: 138336-138346 (2023) - [j18]Mamoru Mimura:
Impact of benign sample size on binary classification accuracy. Expert Syst. Appl. 211: 118630 (2023) - [c32]Phung Minh Ngoc, Mamoru Mimura:
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments. C2SI 2023: 225-241 - [c31]Yuki Nakagawa, Mamoru Mimura:
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs. ISPEC 2023: 562-578 - [c30]Satoki Kanno, Mamoru Mimura:
Detection of Malware Using Self-Attention Mechanism and Strings. NSS 2023: 46-60 - [c29]Takayuki Ishimaru, Mamoru Mimura:
Extracting Common Features of Fake News by Multi-Head-Attention. SocialSec 2023: 23-37 - 2022
- [j17]Mamoru Mimura, Ryo Ito:
Applying NLP techniques to malware detection in a practical environment. Int. J. Inf. Sec. 21(2): 279-291 (2022) - [j16]Mamoru Mimura:
Evaluation of printable character-based malicious PE file-detection method. Internet Things 19: 100521 (2022) - [j15]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers. J. Inf. Process. 30: 486-494 (2022) - [j14]Phung Minh Ngoc, Mamoru Mimura:
Evaluation of a cGAN Model and Random Seed Oversampling on Imbalanced JavaScript Datasets. J. Inf. Process. 30: 591-600 (2022) - [c28]Yuki Mezawa, Mamoru Mimura:
An Attention Mechanism for Visualizing Word Weights in Source Code of PowerShell Samples: Experimental Results and Analysis. BWCCA 2022: 114-124 - [c27]Yuki Mezawa, Mamoru Mimura:
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection. ISPEC 2022: 252-267 - [i2]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura:
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism. CoRR abs/2211.13110 (2022) - 2021
- [j13]Ryusei Maeda, Mamoru Mimura:
Automating post-exploitation with deep reinforcement learning. Comput. Secur. 100: 102108 (2021) - [j12]Phung Minh Ngoc, Mamoru Mimura:
Detection of malicious javascript on an imbalanced dataset. Internet Things 13: 100357 (2021) - [j11]Mamoru Mimura, Yui Tajiri:
Static detection of malicious PowerShell based on word embeddings. Internet Things 15: 100404 (2021) - [j10]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors. Internet Things 15: 100421 (2021) - [j9]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
SVTester: Finding DoS Vulnerabilities of Virtual Switches. J. Inf. Process. 29: 581-591 (2021) - [c26]Mamoru Mimura, Takumi Yamasaki:
Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting. BWCCA 2021: 148-157 - [c25]Phung Minh Ngoc, Mamoru Mimura:
Data augmentation of JavaScript dataset using DCGAN and random seed. CANDAR (Workshops) 2021: 416-419 - 2020
- [j8]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki:
o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN. IEEE Access 8: 31753-31763 (2020) - [j7]Mamoru Mimura:
An Improved Method of Detecting Macro Malware on an Imbalanced Dataset. IEEE Access 8: 204709-204717 (2020) - [j6]Mamoru Mimura:
Adjusting lexical features of actual proxy logs for intrusion detection. J. Inf. Secur. Appl. 50 (2020) - [j5]Mamoru Mimura:
Using fake text vectors to improve the sensitivity of minority class for macro malware detection. J. Inf. Secur. Appl. 54: 102600 (2020) - [j4]Mamoru Mimura, Taro Ohminami:
Using LSI to Detect Unknown Malicious VBA Macros. J. Inf. Process. 28: 493-501 (2020) - [c24]Phung Minh Ngoc, Mamoru Mimura:
Oversampling for Detection of Malicious JavaScript in Realistic Environment. BWCCA 2020: 176-187 - [c23]Yui Tajiri, Mamoru Mimura:
Detection of Malicious PowerShell Using Word-Level Language Models. IWSEC 2020: 39-56
2010 – 2019
- 2019
- [j3]Mamoru Mimura, Hiroya Miura:
Detecting Unseen Malicious VBA Macros with NLP Techniques. J. Inf. Process. 27: 555-563 (2019) - [j2]Mamoru Mimura:
An Attempt to Read Network Traffic with Doc2vec. J. Inf. Process. 27: 711-719 (2019) - [c22]Ryo Ito, Mamoru Mimura:
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques. AsiaJCIS 2019: 1-8 - [c21]Mamoru Mimura, Yuya Suga:
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset. AsiaJCIS 2019: 24-31 - [c20]Hiroki Sato, Mamoru Mimura, Hidema Tanaka:
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. AsiaJCIS 2019: 48-55 - [c19]Son Nguyen Duc, Mamoru Mimura, Hidema Tanaka:
An Analysis of TCP ACK Storm DoS Attack on Virtual Network. ISCIT 2019: 288-293 - [c18]Mamoru Mimura, Taro Ohminami:
Towards Efficient Detection of Malicious VBA Macros with LSI. IWSEC 2019: 168-185 - [c17]Mamoru Mimura:
Using Sparse Composite Document Vectors to Classify VBA Macros. NSS 2019: 714-720 - 2018
- [j1]Mamoru Mimura, Hidema Tanaka:
Leaving All Proxy Server Logs to Paragraph Vector. J. Inf. Process. 26: 804-812 (2018) - [c16]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address Translation. CANDAR 2018: 126-132 - [c15]Junta Imai, Mamoru Mimura, Hidema Tanaka:
Verifiable Secret Sharing Scheme Using Hash Values. CANDAR Workshops 2018: 405-409 - [c14]Mamoru Mimura:
On the Effectiveness of Extracting Important Words from Proxy Logs. CANDAR Workshops 2018: 424-430 - [c13]Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Discovering New Malware Families Using a Linguistic-Based Macros Detection Method. CANDAR Workshops 2018: 431-437 - [c12]Mamoru Mimura, Hidema Tanaka:
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. ICICS 2018: 708-718 - [c11]Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Macros Finder: Do You Remember LOVELETTER? ISPEC 2018: 3-18 - [i1]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto:
o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN. CoRR abs/1806.05328 (2018) - 2017
- [c10]Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka:
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs. AsiaJCIS 2017: 31-37 - [c9]Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto:
Is Emulating "Binary Grep in Eyes" Possible with Machine Learning? CANDAR 2017: 337-343 - [c8]Mamoru Mimura, Hidema Tanaka:
Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec. CANDAR 2017: 456-462 - [c7]Mamoru Mimura, Hidema Tanaka:
Reading Network Packets as a Natural Language for Intrusion Detection. ICISC 2017: 339-350 - [c6]Mamoru Mimura, Hidema Tanaka:
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. ICISS 2017: 146-163 - [c5]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. ICISS 2017: 367-386 - [c4]Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka:
Dark Domain Name Attack: A New Threat to Domain Name System. ICISS 2017: 405-414 - [c3]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Abusing TCP Retransmission for DoS Attack Inside Virtual Network. WISA 2017: 199-211 - 2016
- [c2]Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka:
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File. AsiaJCIS 2016: 147-154 - 2010
- [c1]Mamoru Mimura, Hidehiko Tanaka:
Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic Patterns Using SCTP. BWCCA 2010: 666-671
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint