From post

A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.

, и . ICICS, том 11149 из Lecture Notes in Computer Science, стр. 708-718. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Mimura, Mamoru
add a person with the name Mimura, Mamoru
 

Другие публикации лиц с тем же именем

Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network., , и . ICISS, том 10717 из Lecture Notes in Computer Science, стр. 367-386. Springer, (2017)SVTester: Finding DoS Vulnerabilities of Virtual Switches., , и . J. Inf. Process., (2021)Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec., и . CANDAR, стр. 456-462. IEEE Computer Society, (2017)Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?, , , и . CANDAR, стр. 337-343. IEEE Computer Society, (2017)Behavior Shaver: An Application Based Layer 3 VPN that Conceals Traffic Patterns Using SCTP., и . BWCCA, стр. 666-671. IEEE Computer Society, (2010)Discovering New Malware Families Using a Linguistic-Based Macros Detection Method., , и . CANDAR Workshops, стр. 431-437. IEEE Computer Society, (2018)Macros Finder: Do You Remember LOVELETTER?, , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2018)Abusing TCP Retransmission for DoS Attack Inside Virtual Network., , и . WISA, том 10763 из Lecture Notes in Computer Science, стр. 199-211. Springer, (2017)Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments., и . C2SI, том 13874 из Lecture Notes in Computer Science, стр. 225-241. Springer, (2023)Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting., и . BWCCA, том 346 из Lecture Notes in Networks and Systems, стр. 148-157. Springer, (2021)