Doudou Fall
According to our database1,
Doudou Fall
authored at least 38 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Access, 2024
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage.
IEEE Access, 2024
2022
Internet Things, 2022
2021
Internet Things, 2021
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021
2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2020
Proceedings of the Artificial Intelligence Applications and Innovations, 2020
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2020
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020
2019
J. Inf. Process., 2019
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition.
Proceedings of the Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research, 2019
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Supportive Information to Find Victims from Aerial Video in Search and Rescue Operation.
Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence System, 2019
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2019
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks, 2018
Proceedings of the 15th International Joint Conference on Computer Science and Software Engineering, 2018
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency.
Proceedings of the Edge Computing - EDGE 2018, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018
2017
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017
2016
J. Inf. Process., 2016
2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015
2014
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
2013
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013
2012
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012