Follow
Doudou FALL
Doudou FALL
Associate Professor of Computer Science, Ecole Superieure Polytechnique, University Cheikh Anta Diop
Verified email at esp.sn - Homepage
Title
Cited by
Cited by
Year
LSTM-based intrusion detection system for in-vehicle can bus communications
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
Ieee Access 8, 185489-185502, 2020
1252020
IoT-based water quality monitoring system for soft-shell crab farming
M Niswar, S Wainalang, AA Ilham, Z Zainuddin, Y Fujaya, Z Muslimin, ...
2018 IEEE International Conference on Internet of Things and Intelligence …, 2018
622018
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Internet of Things 14, 100391, 2021
472021
Home edge computing (HEC): Design of a new edge computing technology for achieving ultra-low latency
CSM Babou, D Fall, S Kashihara, I Niang, Y Kadobayashi
Edge Computing–EDGE 2018: Second International Conference, Held as Part of …, 2018
442018
Enabling secure multitenancy in cloud computing: Challenges and approaches
T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo
2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012
412012
Long short-term memory-based intrusion detection system for in-vehicle controller area network bus
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
402020
An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach
MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi
GLOBECOM 2020-2020 IEEE global communications conference, 1-6, 2020
352020
Hierarchical load balancing and clustering technique for home edge computing
CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ...
IEEE Access 8, 127593-127607, 2020
332020
Distinguishing drone types based on acoustic wave by IoT device
N Siriphun, S Kashihara, D Fall, A Khurat
2018 22nd International Computer Science and Engineering Conference (ICSEC), 1-4, 2018
332018
Ssh and ftp brute-force attacks detection in computer networks: Lstm and machine learning approaches
MD Hossain, H Ochiai, F Doudou, Y Kadobayashi
2020 5th international conference on computer and communication systems …, 2020
322020
LSTM-based network attack detection: performance comparison by hyper-parameter values tuning
MD Hossain, H Ochiai, D Fall, Y Kadobayashi
2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020
262020
A survey on blockchain, SDN and NFV for the smart-home security
M Bhuyan, S Kashihara, D Fall, Y Taenaka, Y Kadobayashi
Internet of Things 20, 100588, 2022
252022
Risk adaptive authorization mechanism (RAdAM) for cloud computing
D Fall, T Okuda, Y Kadobayashi, S Yamaguchi
Journal of Information Processing 24 (2), 371-380, 2016
232016
Toward quantified risk-adaptive access control for multi-tenant cloud computing
D Fall, G Blanc, T Okuda, Y Kadobayashi, S Yamaguchi
The 6th Joint Workshop on Information Security, 1-14, 2011
232011
Fault tree analysis-based risk quantification of smart homes
C Wongvises, A Khurat, D Fall, S Kashihara
2017 2nd International Conference on Information Technology (INCIT), 1-6, 2017
222017
UnPhishMe: Phishing attack detection by deceptive login simulation through an Android mobile app
JD Ndibwile, Y Kadobayashi, D Fall
2017 12th Asia Joint Conference on Information Security (AsiaJCIS), 38-47, 2017
222017
An empirical approach to phishing countermeasures through smart glasses and validation agents
JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi
IEEE Access 7, 130758-130771, 2019
212019
SDN-enabled IoT anomaly detection using ensemble learning
E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ...
Artificial Intelligence Applications and Innovations: 16th IFIP WG 12.5 …, 2020
192020
The best of both worlds: A new composite framework leveraging pos and pow for blockchain security and governance
M Baudlet, F Doudou, Y Taenaka, Y Kadobayashi
2020 2nd Conference on Blockchain Research & Applications for Innovative …, 2020
162020
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
D Fall, Y Kadobayashi
Proceedings of the 5th International Conference on Information Systems …, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20