Login / Signup
Doudou Fall
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 33
Top Topics
Intrusion Detection System
Load Balancing
Cloud Computing
E Learning
Top Venues
IEEE Access
J. Inf. Process.
Internet Things
InterSol
</>
Publications
</>
Bernard Ousmane Sané
,
Mandicou Ba
,
Doudou Fall
,
Yuzo Taenaka
,
Ibrahima Niang
,
Youki Kadobayashi
Interdependency Attack-Aware Secure and Performant Virtual Machine Allocation Policies With Low Attack Efficiency and Coverage.
IEEE Access
12 (2024)
N'guessan Yves-Roland Douha
,
Monowar Bhuyan
,
Shigeru Kashihara
,
Doudou Fall
,
Yuzo Taenaka
,
Youki Kadobayashi
A survey on blockchain, SDN and NFV for the smart-home security.
Internet Things
20 (2022)
Cheikh Saliou Mbacke Babou
,
Doudou Fall
,
Shigeru Kashihara
,
Yuzo Taenaka
,
Monowar H. Bhuyan
,
Ibrahima Niang
,
Ibrahima Diane
,
Youki Kadobayashi
D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems.
FiCloud
(2021)
Enkhtur Tsogbaatar
,
Monowar H. Bhuyan
,
Doudou Fall
,
Yuzo Taenaka
,
Gonchigsumlaa Khishigjargal
,
Erik Elmroth
,
Youki Kadobayashi
A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications.
IEA/AIE (1)
(2021)
Enkhtur Tsogbaatar
,
Monowar H. Bhuyan
,
Yuzo Taenaka
,
Doudou Fall
,
Gonchigsumlaa Khishigjargal
,
Erik Elmroth
,
Youki Kadobayashi
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT.
Internet Things
14 (2021)
Taisho Sasada
,
Yuto Masuda
,
Yuzo Taenaka
,
Youki Kadobayashi
,
Doudou Fall
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams.
SDS
(2021)
Mohd Ruzeiny Bin Kamaruzzaman
,
Bernard Ousmane Sané
,
Doudou Fall
,
Yuzo Taenaka
,
Youki Kadobayashi
Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD Dynamics.
CSR
(2021)
Taisho Sasada
,
Masataka Kawai
,
Yuzo Taenaka
,
Doudou Fall
,
Youki Kadobayashi
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss.
ICAIIC
(2021)
Cheikh Saliou Mbacke Babou
,
Doudou Fall
,
Shigeru Kashihara
,
Yuzo Taenaka
,
Monowar H. Bhuyan
,
Ibrahima Niang
,
Youki Kadobayashi
Hierarchical Load Balancing and Clustering Technique for Home Edge Computing.
IEEE Access
8 (2020)
Md Delwar Hossain
,
Hiroyuki Inoue
,
Hideya Ochiai
,
Doudou Fall
,
Youki Kadobayashi
An Effective In-Vehicle CAN Bus Intrusion Detection System Using CNN Deep Learning Approach.
GLOBECOM
(2020)
Md Delwar Hossain
,
Hiroyuki Inoue
,
Hideya Ochiai
,
Doudou Fall
,
Youki Kadobayashi
Long Short-Term Memory-Based Intrusion Detection System for In-Vehicle Controller Area Network Bus.
COMPSAC
(2020)
Enkhtur Tsogbaatar
,
Monowar H. Bhuyan
,
Yuzo Taenaka
,
Doudou Fall
,
Gonchigsumlaa Khishigjargal
,
Erik Elmroth
,
Youki Kadobayashi
SDN-Enabled IoT Anomaly Detection Using Ensemble Learning.
AIAI (2)
(2020)
Md Delwar Hossain
,
Hideya Ochiai
,
Doudou Fall
,
Youki Kadobayashi
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning.
CSCloud/EdgeCom
(2020)
Matthias Baudlet
,
Doudou Fall
,
Yuzo Taenaka
,
Youki Kadobayashi
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance.
BRAINS
(2020)
Bernard Ousmane Sané
,
Mandicou Ba
,
Doudou Fall
,
Shigeru Kashihara
,
Yuzo Taenaka
,
Ibrahima Niang
,
Youki Kadobayashi
Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker's Efficiency and Coverage.
CCGRID
(2020)
Md Delwar Hossain
,
Hideya Ochiai
,
Doudou Fall
,
Youki Kadobayashi
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches.
ICCCS
(2020)
Md Delwar Hossain
,
Hiroyuki Inoue
,
Hideya Ochiai
,
Doudou Fall
,
Youki Kadobayashi
LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications.
IEEE Access
8 (2020)
Assane Gueye
,
Babacar Mbaye
,
Doudou Fall
,
Alassane Diop
,
Shigeru Kashihara
A Matrix Model to Analyze Cascading Failure in Critical Infrastructures.
InterSol
(2020)
Jema David Ndibwile
,
Edith Talina Luhanga
,
Doudou Fall
,
Youki Kadobayashi
A Demographic Perspective of Smartphone Security and Its Redesigned Notifications.
J. Inf. Process.
27 (2019)
Bernard Ousmane Sané
,
Cheikh Saliou Mbacke Babou
,
Doudou Fall
,
Ibrahima Niang
A Survey of Game Theoretic Solutions for Cloud Computing Security Issues.
InterSol
(2019)
Tan Omiya
,
Doudou Fall
,
Youki Kadobayashi
IoT-Poly: An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition.
Koli Calling
(2019)
Jema David Ndibwile
,
Edith Talina Luhanga
,
Doudou Fall
,
Daisuke Miyamoto
,
Gregory Blanc
,
Youki Kadobayashi
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents.
IEEE Access
7 (2019)
Shigeru Kashihara
,
Muh. Arief Wicaksono
,
Doudou Fall
,
Muhammad Niswar
Supportive Information to Find Victims from Aerial Video in Search and Rescue Operation.
IoTaIS
(2019)
Serigne Mouhamadane Diop
,
Jema David Ndibwile
,
Doudou Fall
,
Shigeru Kashihara
,
Youki Kadobayashi
To Coerce or Not to Coerce? A Quantitative Investigation on Cybersecurity and Cybercrime Legislations Towards Large-Scale Vulnerability Notifications.
ISSRE Workshops
(2019)
Doudou Fall
,
Youki Kadobayashi
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy?
ICISSP
(2019)
Pongjarun Kosolyudhthasarn
,
Vasaka Visoottiviseth
,
Doudou Fall
,
Shigeru Kashihara
Drone Detection and Identification by Using Packet Length Signature.
JCSSE
(2018)
Jema David Ndibwile
,
Edith Talina Luhanga
,
Doudou Fall
,
Daisuke Miyamoto
,
Youki Kadobayashi
A comparative study of smartphone-user security perception and preference towards redesigned security notifications.
AfriCHI
(2018)
Muhammad Niswar
,
Sonny Wainalang
,
Amil A. Ilham
,
Zahir Zainuddin
,
Yushinta Fujaya
,
Zaenab Muslimin
,
Ady Wahyudi Paundu
,
Shigeru Kashihara
,
Doudou Fall
IoT-based Water Quality Monitoring System for Soft-Shell Crab Farming.
IOTAIS
(2018)
Cheikh Saliou Mbacke Babou
,
Doudou Fall
,
Shigeru Kashihara
,
Ibrahima Niang
,
Youki Kadobayashi
Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency.
EDGE
(2018)
M. Rosyidi
,
Ratih H. Puspita
,
Shigeru Kashihara
,
Doudou Fall
,
Kazushi Ikeda
A Design of IoT-Based Searching System for Displaying Victim's Presence Area.
COMPSAC (2)
(2018)
Ady Wahyudi Paundu
,
Doudou Fall
,
Daisuke Miyamoto
,
Youki Kadobayashi
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment.
Secur. Commun. Networks
2018 (2018)
Jema David Ndibwile
,
Youki Kadobayashi
,
Doudou Fall
UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App.
AsiaJCIS
(2017)
Doudou Fall
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing.
J. Inf. Process.
24 (2) (2016)
Doudou Fall
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
Security Risk Quantification Mechanism for Infrastructure as a Service Cloud Computing Platforms.
J. Inf. Process.
23 (4) (2015)
Doudou Fall
,
Takeshi Okuda
,
Youki Kadobayashi
,
Suguru Yamaguchi
Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture.
TRUST
(2014)
Doudou Fall
,
Takeshi Okuda
,
Noppawat Chaisamran
,
Youki Kadobayashi
,
Suguru Yamaguchi
Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing.
CLOSER
(2013)
Takeshi Takahashi
,
Gregory Blanc
,
Youki Kadobayashi
,
Doudou Fall
,
Hiroaki Hazeyama
,
Shin'ichiro Matsuo
Enabling secure multitenancy in cloud computing: Challenges and approaches.
BCFIC
(2012)