Mamoru Mimura

Orcid: 0000-0003-4323-9911

According to our database1, Mamoru Mimura authored at least 53 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism.
IEEE Access, 2024

2023
Impact of benign sample size on binary classification accuracy.
Expert Syst. Appl., 2023

A Feasibility Study on Evasion Attacks Against NLP-Based Macro Malware Detection Algorithms.
IEEE Access, 2023

Extracting Common Features of Fake News by Multi-Head-Attention.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Detection of Malware Using Self-Attention Mechanism and Strings.
Proceedings of the Network and System Security - 17th International Conference, 2023

XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs.
Proceedings of the Information Security Practice and Experience, 2023

Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers.
J. Inf. Process., 2022

Evaluation of a cGAN Model and Random Seed Oversampling on Imbalanced JavaScript Datasets.
J. Inf. Process., 2022

Evaluation of printable character-based malicious PE file-detection method.
Internet Things, 2022

Applying NLP techniques to malware detection in a practical environment.
Int. J. Inf. Sec., 2022

Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection.
Proceedings of the Information Security Practice and Experience, 2022

An Attention Mechanism for Visualizing Word Weights in Source Code of PowerShell Samples: Experimental Results and Analysis.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
SVTester: Finding DoS Vulnerabilities of Virtual Switches.
J. Inf. Process., 2021

SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors.
Internet Things, 2021

Detection of malicious javascript on an imbalanced dataset.
Internet Things, 2021

Static detection of malicious PowerShell based on word embeddings.
Internet Things, 2021

Automating post-exploitation with deep reinforcement learning.
Comput. Secur., 2021

Data augmentation of JavaScript dataset using DCGAN and random seed.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

2020
Using LSI to Detect Unknown Malicious VBA Macros.
J. Inf. Process., 2020

Using fake text vectors to improve the sensitivity of minority class for macro malware detection.
J. Inf. Secur. Appl., 2020

Adjusting lexical features of actual proxy logs for intrusion detection.
J. Inf. Secur. Appl., 2020

o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN.
IEEE Access, 2020

An Improved Method of Detecting Macro Malware on an Imbalanced Dataset.
IEEE Access, 2020

Detection of Malicious PowerShell Using Word-Level Language Models.
Proceedings of the Advances in Information and Computer Security, 2020

Oversampling for Detection of Malicious JavaScript in Realistic Environment.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

2019
Detecting Unseen Malicious VBA Macros with NLP Techniques.
J. Inf. Process., 2019

An Attempt to Read Network Traffic with Doc2vec.
J. Inf. Process., 2019

Using Sparse Composite Document Vectors to Classify VBA Macros.
Proceedings of the Network and System Security - 13th International Conference, 2019

Towards Efficient Detection of Malicious VBA Macros with LSI.
Proceedings of the Advances in Information and Computer Security, 2019

An Analysis of TCP ACK Storm DoS Attack on Virtual Network.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019

Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Leaving All Proxy Server Logs to Paragraph Vector.
J. Inf. Process., 2018

o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN.
CoRR, 2018

Macros Finder: Do You Remember LOVELETTER?
Proceedings of the Information Security Practice and Experience, 2018

A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address Translation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Discovering New Malware Families Using a Linguistic-Based Macros Detection Method.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

On the Effectiveness of Extracting Important Words from Proxy Logs.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Verifiable Secret Sharing Scheme Using Hash Values.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
Abusing TCP Retransmission for DoS Attack Inside Virtual Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Dark Domain Name Attack: A New Threat to Domain Name System.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Reading Network Packets as a Natural Language for Intrusion Detection.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2010
Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic Patterns Using SCTP.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010


  Loading...