Doudou Fall

According to our database1, Doudou Fall authored at least 38 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control.
IEEE Access, 2024

Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage.
IEEE Access, 2024

2022
A survey on blockchain, SDN and NFV for the smart-home security.
Internet Things, 2022

2021
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT.
Internet Things, 2021

Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications.
Proceedings of the Advances and Trends in Artificial Intelligence. Artificial Intelligence Practices, 2021

Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021

Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications.
IEEE Access, 2020

Hierarchical Load Balancing and Clustering Technique for Home Edge Computing.
IEEE Access, 2020

A Matrix Model to Analyze Cascading Failure in Critical Infrastructures.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2020

SDN-Enabled IoT Anomaly Detection Using Ensemble Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2020

An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2020

LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications.
J. Inf. Process., 2019

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access, 2019

IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition.
Proceedings of the Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research, 2019

To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

Supportive Information to Find Victims from Aerial Video in Search and Rescue Operation.
Proceedings of the 2019 IEEE International Conference on Internet of Things and Intelligence System, 2019

A Survey of Game Theoretic Solutions for Cloud Computing Security Issues.
Proceedings of the Innovations and Interdisciplinary Solutions for Underserved Areas, 2019

The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks, 2018

Drone Detection and Identification by Using Packet Length Signature.
Proceedings of the 15th International Joint Conference on Computer Science and Software Engineering, 2018

IoT-based Water Quality Monitoring System for Soft-Shell Crab Farming.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency.
Proceedings of the Edge Computing - EDGE 2018, 2018

A Design of IoT-Based Searching System for Displaying Victim's Presence Area.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, 2018

2017
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

2016
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing.
J. Inf. Process., 2016

2015
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process., 2015

2014
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
Proceedings of the CLOSER 2013, 2013

2012
Enabling secure multitenancy in cloud computing: Challenges and approaches.
Proceedings of the 2nd Baltic Congress on Future Internet Communications, 2012


  Loading...