LSTM-based intrusion detection system for in-vehicle can bus communications MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi Ieee Access 8, 185489-185502, 2020 | 202 | 2020 |
IoT-based water quality monitoring system for soft-shell crab farming M Niswar, S Wainalang, AA Ilham, Z Zainuddin, Y Fujaya, Z Muslimin, ... 2018 IEEE International Conference on Internet of Things and Intelligence …, 2018 | 84 | 2018 |
DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ... Internet of Things 14, 100391, 2021 | 65 | 2021 |
An effective in-vehicle CAN bus intrusion detection system using CNN deep learning approach MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi GLOBECOM 2020-2020 IEEE global communications conference, 1-6, 2020 | 59 | 2020 |
Ssh and ftp brute-force attacks detection in computer networks: Lstm and machine learning approaches MD Hossain, H Ochiai, F Doudou, Y Kadobayashi 2020 5th international conference on computer and communication systems …, 2020 | 57 | 2020 |
Home edge computing (HEC): Design of a new edge computing technology for achieving ultra-low latency CSM Babou, D Fall, S Kashihara, I Niang, Y Kadobayashi Edge Computing–EDGE 2018: Second International Conference, Held as Part of …, 2018 | 53 | 2018 |
Long short-term memory-based intrusion detection system for in-vehicle controller area network bus MD Hossain, H Inoue, H Ochiai, D Fall, Y Kadobayashi 2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020 | 47 | 2020 |
Hierarchical load balancing and clustering technique for home edge computing CSM Babou, D Fall, S Kashihara, Y Taenaka, MH Bhuyan, I Niang, ... IEEE Access 8, 127593-127607, 2020 | 43 | 2020 |
Enabling secure multitenancy in cloud computing: Challenges and approaches T Takahashi, G Blanc, Y Kadobayashi, D Fall, H Hazeyama, S Matsuo 2012 2nd Baltic Congress on Future Internet Communications, 72-79, 2012 | 41 | 2012 |
A survey on blockchain, SDN and NFV for the smart-home security M Bhuyan, S Kashihara, D Fall, Y Taenaka, Y Kadobayashi Internet of Things 20, 100588, 2022 | 40 | 2022 |
LSTM-based network attack detection: performance comparison by hyper-parameter values tuning MD Hossain, H Ochiai, D Fall, Y Kadobayashi 2020 7th IEEE International Conference on Cyber Security and Cloud Computing …, 2020 | 33 | 2020 |
Distinguishing drone types based on acoustic wave by IoT device N Siriphun, S Kashihara, D Fall, A Khurat 2018 22nd International Computer Science and Engineering Conference (ICSEC), 1-4, 2018 | 33 | 2018 |
An empirical approach to phishing countermeasures through smart glasses and validation agents JD Ndibwile, ET Luhanga, D Fall, D Miyamoto, G Blanc, Y Kadobayashi Ieee Access 7, 130758-130771, 2019 | 29 | 2019 |
UnPhishMe: Phishing attack detection by deceptive login simulation through an Android mobile app JD Ndibwile, Y Kadobayashi, D Fall 2017 12th Asia Joint Conference on Information Security (AsiaJCIS), 38-47, 2017 | 28 | 2017 |
Fault tree analysis-based risk quantification of smart homes C Wongvises, A Khurat, D Fall, S Kashihara 2017 2nd International Conference on Information Technology (INCIT), 1-6, 2017 | 25 | 2017 |
Toward quantified risk-adaptive access control for multi-tenant cloud computing D Fall, G Blanc, T Okuda, Y Kadobayashi, S Yamaguchi The 6th Joint Workshop on Information Security, 1-14, 2011 | 25 | 2011 |
The best of both worlds: A new composite framework leveraging pos and pow for blockchain security and governance M Baudlet, F Doudou, Y Taenaka, Y Kadobayashi 2020 2nd Conference on Blockchain Research & Applications for Innovative …, 2020 | 24 | 2020 |
SDN-enabled IoT anomaly detection using ensemble learning E Tsogbaatar, MH Bhuyan, Y Taenaka, D Fall, K Gonchigsumlaa, ... Artificial Intelligence Applications and Innovations: 16th IFIP WG 12.5 …, 2020 | 24 | 2020 |
Risk adaptive authorization mechanism (RAdAM) for cloud computing D Fall, T Okuda, Y Kadobayashi, S Yamaguchi Journal of Information Processing 24 (2), 371-380, 2016 | 23 | 2016 |
The Common Vulnerability Scoring System vs. Rock Star Vulnerabilities: Why the Discrepancy? D Fall, Y Kadobayashi Proceedings of the 5th International Conference on Information Systems …, 2019 | 14 | 2019 |