default search action
Doudou Fall
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage. IEEE Access 12: 74944-74960 (2024) - [j10]Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control. IEEE Access 12: 129611-129622 (2024) - 2022
- [j9]N'guessan Yves-Roland Douha, Monowar H. Bhuyan, Shigeru Kashihara, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
A survey on blockchain, SDN and NFV for the smart-home security. Internet Things 20: 100588 (2022) - 2021
- [j8]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT. Internet Things 14: 100391 (2021) - [c27]Mohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics. CSR 2021: 241-248 - [c26]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Ibrahima Diané, Youki Kadobayashi:
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems. FiCloud 2021: 304-310 - [c25]Taisho Sasada, Masataka Kawai, Yuzo Taenaka, Doudou Fall, Youki Kadobayashi:
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss. ICAIIC 2021: 42-47 - [c24]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Doudou Fall, Yuzo Taenaka, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications. IEA/AIE (1) 2021: 530-543 - [c23]Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall:
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams. SDS 2021: 1-8 - 2020
- [j7]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Monowar H. Bhuyan, Ibrahima Niang, Youki Kadobayashi:
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing. IEEE Access 8: 127593-127607 (2020) - [j6]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. IEEE Access 8: 185489-185502 (2020) - [c22]Matthias Baudlet, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi:
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance. BRAINS 2020: 17-24 - [c21]Bernard Ousmane Sané, Mandicou Ba, Doudou Fall, Shigeru Kashihara, Yuzo Taenaka, Ibrahima Niang, Youki Kadobayashi:
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage. CCGRID 2020: 440-449 - [c20]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches. ICCCS 2020: 491-497 - [c19]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus. COMPSAC 2020: 10-17 - [c18]Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. CSCloud/EdgeCom 2020: 62-69 - [c17]Md Delwar Hossain, Hiroyuki Inoue, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach. GLOBECOM 2020: 1-6 - [c16]Enkhtur Tsogbaatar, Monowar H. Bhuyan, Yuzo Taenaka, Doudou Fall, Gonchigsumlaa Khishigjargal, Erik Elmroth, Youki Kadobayashi:
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. AIAI (2) 2020: 268-280 - [c15]Assane Gueye, Babacar Mbaye, Doudou Fall, Alassane Diop, Shigeru Kashihara:
A Matrix Model to Analyze Cascading Failure in Critical Infrastructures. InterSol 2020: 211-223
2010 – 2019
- 2019
- [j5]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Gregory Blanc, Youki Kadobayashi:
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents. IEEE Access 7: 130758-130771 (2019) - [j4]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Youki Kadobayashi:
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications. J. Inf. Process. 27: 773-786 (2019) - [c14]Doudou Fall, Youki Kadobayashi:
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? ICISSP 2019: 405-411 - [c13]Bernard Ousmane Sané, Cheikh Saliou Mbacke Babou, Doudou Fall, Ibrahima Niang:
A Survey of Game Theoretic Solutions for Cloud Computing Security Issues. InterSol 2019: 1-12 - [c12]Shigeru Kashihara, Muh. Arief Wicaksono, Doudou Fall, Muhammad Niswar:
Supportive Information to Find Victims from Aerial Video in Search and Rescue Operation. IoTaIS 2019: 56-61 - [c11]Serigne Mouhamadane Diop, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Youki Kadobayashi:
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications. ISSRE Workshops 2019: 282-287 - [c10]Tan Omiya, Doudou Fall, Youki Kadobayashi:
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition. Koli Calling 2019: 16:1-16:10 - 2018
- [j3]Ady Wahyudi Paundu, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment. Secur. Commun. Networks 2018: 4216240:1-4216240:18 (2018) - [c9]Jema David Ndibwile, Edith Talina Luhanga, Doudou Fall, Daisuke Miyamoto, Youki Kadobayashi:
A comparative study of smartphone-user security perception and preference towards redesigned security notifications. AfriCHI 2018: 17:1-17:6 - [c8]Mohammad Rosyidi, Ratih H. Puspita, Shigeru Kashihara, Doudou Fall, Kazushi Ikeda:
A Design of IoT-Based Searching System for Displaying Victim's Presence Area. COMPSAC (2) 2018: 8-13 - [c7]Cheikh Saliou Mbacke Babou, Doudou Fall, Shigeru Kashihara, Ibrahima Niang, Youki Kadobayashi:
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency. EDGE 2018: 3-17 - [c6]Muhammad Niswar, Sonny Wainalang, Amil A. Ilham, Zahir Zainuddin, Yushinta Fujaya, Zaenab Muslimin, Ady Wahyudi Paundu, Shigeru Kashihara, Doudou Fall:
IoT-based Water Quality Monitoring System for Soft-Shell Crab Farming. IOTAIS 2018: 6-9 - [c5]Pongjarun Kosolyudhthasarn, Vasaka Visoottiviseth, Doudou Fall, Shigeru Kashihara:
Drone Detection and Identification by Using Packet Length Signature. JCSSE 2018: 1-6 - 2017
- [c4]Jema David Ndibwile, Youki Kadobayashi, Doudou Fall:
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App. AsiaJCIS 2017: 38-47 - 2016
- [j2]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing. J. Inf. Process. 24(2): 371-380 (2016) - 2015
- [j1]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms. J. Inf. Process. 23(4): 465-475 (2015) - 2014
- [c3]Doudou Fall, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi:
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture. TRUST 2014: 127-142 - 2013
- [c2]Doudou Fall, Takeshi Okuda, Noppawat Chaisamran, Youki Kadobayashi, Suguru Yamaguchi:
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing. CLOSER 2013: 145-148 - 2012
- [c1]Takeshi Takahashi, Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama, Shin'ichiro Matsuo:
Enabling secure multitenancy in cloud computing: Challenges and approaches. BCFIC 2012: 72-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint