Assane Gueye

Orcid: 0000-0001-6469-4716

According to our database1, Assane Gueye authored at least 38 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Poster: Towards A Low-Cost Mobile Internet Measurement Infrastructure: An Initial Deployment in Africa.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

A Road map for the Democratization of Space-Based Communications.
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024

Demo: A Low-Cost Honeynet Infrastructure For Smishing Data Collection.
Proceedings of the 7th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, 2024

2023
Critical Software Security Weaknesses.
IT Prof., 2023

User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania.
CoRR, 2023

A Learning and Control Perspective for Microfinance.
Proceedings of the Learning for Dynamics and Control Conference, 2023

F4PW: Fog Computer for Pregnant Women.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2023

Digital Public Goods Interoperability: A Low-Code Middleware Approach.
Proceedings of the 6th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, 2023

Evaluating Mobile Banking Application Security Posture Using the OWASP's MASVS Framework.
Proceedings of the 6th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, 2023

2021
A Decade of Reoccurring Software Weaknesses.
IEEE Secur. Priv., 2021

A Historical and Statistical Studyof the Software Vulnerability Landscape.
CoRR, 2021

2020
A Matrix Model to Analyze Cascading Failure in Critical Infrastructures.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2020

A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Measurements of the Most Significant Software Security Weaknesses.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
An Optimized, Low-Cost Off-grid Solar System: Design and Implementation.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2019

Africa's Online Access: What Data Is Getting Accessed and Where It Is Hosted?
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2019

Poster: Proposal of an Intelligent Remote Tutoring Model.
Proceedings of the Internet of Things, Infrastructures and Mobile Applications - Proceedings of the 13th IMCL Conference, Thessaloniki, Greece, 31 October, 2019

2018
Quantifying Information Exposure in Internet Routing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Study of the Wind Potential in Climatic Zones of Chad.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2018

On the Prevalence of Boomerang Routing in Africa: Analysis and Potential Solutions.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2018

2017
An Alert System on the Presence of Myriapods in Peanut Farms in Senegal.
EAI Endorsed Trans. Collab. Comput., 2017

An Opportunistic Connectivity Network for Rural Areas in Senegal.
Proceedings of the Innovation and Interdisciplinary Solutions for Underserved Areas, 2017

Impact of the Utilization of the Biodigester in the Populations of Bambey and Perspectives for Mass Adoption and Valorization.
Proceedings of the Innovation and Interdisciplinary Solutions for Underserved Areas, 2017

2015
Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity.
Internet Math., 2015

Defensive Resource Allocations with Security Chokepoints in IPv6 Networks.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

On the Internet Connectivity in Africa.
Proceedings of the e-Infrastructure and e-Services - 7th International Conference, 2015

2014
Quantifying all-to-one network topology robustness under budget constraints.
SIGMETRICS Perform. Evaluation Rev., 2014

2013
Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

2012
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach.
Proceedings of the Game Theory for Networks, 2012

2011
How to Choose Communication Links in an Adversarial Environment?
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

Network design game with both reliability and security failures.
Proceedings of the 49th Annual Allerton Conference on Communication, 2011

2010
Design of Network Topology in an Adversarial Environment.
Proceedings of the Decision and Game Theory for Security, 2010

2009
Iterative Node Deployment in an Unknown Environment.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A novel approach to bottleneck analysis in networks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Convex Upper Bound on the Log-Partition Function for Binary Distributions.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

Security in networks: A game-theoretic approach.
Proceedings of the 47th IEEE Conference on Decision and Control, 2008


  Loading...