What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mamoru Mimura
Google Scholar
ORCID:
0000-0003-4323-9911
17
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/icics
Evasion Attempt for the Malicious PowerShell Detector Considering Feature Weights.
Kou Sugiura
Mamoru Mimura
2021
journals/compsec
Automating post-exploitation with deep reinforcement learning.
Ryusei Maeda
Mamoru Mimura
2020
journals/istr
Adjusting lexical features of actual proxy logs for intrusion detection.
Mamoru Mimura
2020
journals/istr
Using fake text vectors to improve the sensitivity of minority class for macro malware detection.
Mamoru Mimura
2020
conf/iwsec
Detection of Malicious PowerShell Using Word-Level Language Models.
Yui Tajiri
Mamoru Mimura
2019
conf/asiajcis
Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques.
Ryo Ito
Mamoru Mimura
2019
conf/asiajcis
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo.
Hiroki Sato
Mamoru Mimura
Hidema Tanaka
2019
conf/asiajcis
Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset.
Mamoru Mimura
Yuya Suga
2019
conf/iwsec
Towards Efficient Detection of Malicious VBA Macros with LSI.
Mamoru Mimura
Taro Ohminami
2018
conf/icics
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.
Mamoru Mimura
Hidema Tanaka
2017
conf/asiajcis
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs.
Mamoru Mimura
Yuhei Otsubo
Hidehiko Tanaka
Hidema Tanaka
2017
conf/icisc
Reading Network Packets as a Natural Language for Intrusion Detection.
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Son Duc Nguyen
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Dark Domain Name Attack: A New Threat to Domain Name System.
Bold Munkhbaatar
Mamoru Mimura
Hidema Tanaka
2017
conf/wisa
Abusing TCP Retransmission for DoS Attack Inside Virtual Network.
Son Duc Nguyen
Mamoru Mimura
Hidema Tanaka
2016
conf/asiajcis
Evaluation of a Brute Forcing Tool that Extracts the RAT from a Malicious Document File.
Mamoru Mimura
Yuhei Otsubo
Hidehiko Tanaka
Coauthors
Bold Munkhbaatar
(1)
Hidehiko Tanaka
(2)
Hidema Tanaka
(8)
Hiroki Sato
(1)
Kou Sugiura
(1)
Mamoru Mimura
(17)
Ryo Ito
(1)
Ryusei Maeda
(1)
Son Duc Nguyen
(2)
Taro Ohminami
(1)
Yuhei Otsubo
(2)
Yui Tajiri
(1)
Yuya Suga
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to