关注
Doudou FALL
Doudou FALL
Associate Professor of Computer Science, Ecole Superieure Polytechnique, University Cheikh Anta Diop
在 esp.sn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
LSTM-based intrusion detection system for in-vehicle can bus communications
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
Ieee Access 8, 185489-185502, 2020
1372020
IoT-based water quality monitoring system for soft-shell crab farming
M Niswar, S Wainalang, AA Ilham, Z Zainuddin, Y Fujaya, Z Muslimin, ...
2018 IEEE international conference on Internet of Things and intelligence …, 2018
672018
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
502021
Home edge computing (HEC): Design of a new edge computing technology for achieving ultra-low latency
CSM Babou, D Fall, S Kashihara, I Niang, Y Kadobayashi
Edge Computing–EDGE 2018: Second International Conference, Held as Part of …, 2018
492018
Ssh and ftp brute-force attacks detection in computer networks: Lstm and machine learning approaches
MD Hossain, H Ochiai, F Doudou, Y Kadobayashi
2020 5th international conference on computer and communication systems …, 2020
422020
Long short-term memory-based intrusion detection system for in-vehicle controller area network bus
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
412020
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
412012
An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
GLOBECOM 2020-2020 IEEE global communications conference, 1-6, 2020
392020
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
392020
A survey on blockchain, SDN and NFV for the smart-home security
M Bhuyan, S Kashihara, D Fall, Y Taenaka, Y Kadobayashi
Internet of Things 20, 100588, 2022
332022
Distinguishing drone types based on acoustic wave by IoT device
N Siriphun, S Kashihara, D Fall, A Khurat
2018 22nd International Computer Science and Engineering Conference (ICSEC), 1-4, 2018
332018
LSTM-based network attack detection: performance comparison by hyper-parameter values tuning
MD Hossain, H Ochiai, D Fall, Y Kadobayashi
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
262020
An empirical approach to phishing countermeasures through smart glasses and validation agents
JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi
IEEE Access 7, 130758-130771, 2019
252019
Fault tree analysis-based risk quantification of smart homes
C Wongvises, A Khurat, D Fall, S Kashihara
2017 2nd International Conference on Information Technology (INCIT), 1-6, 2017
242017
UnPhishMe: Phishing attack detection by deceptive login simulation through an Android mobile app
JD Ndibwile, Y Kadobayashi, D Fall
2017 12th Asia Joint Conference on Information Security (AsiaJCIS), 38-47, 2017
242017
Risk adaptive authorization mechanism (RAdAM) for cloud computing
D Fall, T Okuda, Y Kadobayashi, S Yamaguchi
Journal of Information Processing 24 (2), 371-380, 2016
242016
Toward quantified risk-adaptive access control for multi-tenant cloud computing
D Fall, G Blanc, T Okuda, Y Kadobayashi, S Yamaguchi
The 6th Joint Workshop on Information Security, 1-14, 2011
242011
SDN-enabled IoT anomaly detection using ensemble learning
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Artificial Intelligence Applications and Innovations: 16th IFIP WG 12.5 …, 2020
192020
The best of both worlds: A new composite framework leveraging pos and pow for blockchain security and governance
M Baudlet, F Doudou, Y Taenaka, Y Kadobayashi
2020 2nd Conference on Blockchain Research & Applications for Innovative …, 2020
172020
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
D Fall, Y Kadobayashi
Proceedings of the 5th International Conference on Information Systems …, 2019
142019
系统目前无法执行此操作,请稍后再试。
文章 1–20