System Calls Analysis of Malwares on Android F Tchakounté, P Dayang International Journal of Science and Technology 2 (9), 669-674, 2013 | 65 | 2013 |
A smart contract logic to reduce hoax propagation across social media F Tchakounté, KA Calvin, AAA Ari, DJF Mbogne Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 43 | 2022 |
Permission-based Malware Detection Mechanisms on Android: Analysis and Perspectives F Tchakounté Journal of Computer Science 1 (2), 2014 | 43 | 2014 |
Transfer learning for the detection and diagnosis of types of pneumonia including pneumonia induced by COVID-19 from chest X-ray images Y Brima, M Atemkeng, S Tankio Djiokap, J Ebiele, F Tchakounté Diagnostics 11 (8), 1480, 2021 | 32 | 2021 |
A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News F Tchakounté, A Faissal, M Atemkeng, A Ntyam Information 11 (6), 1-25, 2020 | 27 | 2020 |
LimonDroid: a system coupling three signature-based schemes for profiling Android malware F Tchakounté, RCN Ngassi, VC Kamla, KP Udagepola Iran Journal of Computer Science 4, 95-114, 2021 | 20 | 2021 |
Supervised learning based detection of malware on android F Tchakounté, F Hayata Mobile Security and Privacy, 101-154, 2017 | 19 | 2017 |
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies F Tchakounte, V Simé Nyassi, DE Houpa Danga, K Priyanath Udagepola, ... EAI Endorsed Transactions on Scalable Information Systems, 2020 | 18 | 2020 |
Detection of Android Malware based on Sequence Alignment of Permissions F Tchakounté, AD Wandala, Y Tiguiane International Journal of Computer (IJC) 35 (1), 26-36, 2019 | 12 | 2019 |
A review of gamification applied to phishing F Tchakounté, LK Wabo, M Atemkeng Preprints, 2020 | 11 | 2020 |
A Description Logic Ontology for Email Phishing F Tchakounté, D Molengar, JM Ngossaha International Journal of Information Security Science 9 (1), 44-63, 2020 | 10 | 2020 |
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism F Tchakounte, JCT Ngnintedem, I Damakoa, F Ahmadou, FAK Fotso Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 9 | 2022 |
An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images F Tchakounté, P Chassem Kamdem, JC Kamgang, ... EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2020 | 8 | 2020 |
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network F Tchakounte, M Nakoe, BO Yenke, KP Udagepola International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (4 …, 2019 | 8 | 2019 |
CIAA-RepDroid: a fine-grained and probabilistic reputation scheme for android apps based on sentiment analysis of reviews F Tchakounté, AE Yera Pagor, JC Kamgang, M Atemkeng Future Internet 12 (9), 145, 2020 | 7 | 2020 |
A Malware Detection System for Android F Tchakounté Universität Bremen, 2015 | 6 | 2015 |
Determinants of cybercrime victimization: Experiences and multi-stage recommendations from a survey in Cameroon JE Ntsama, F Tchakounte, D Tchakounte Tchuimi, A Faissal, ... International Conference on e-Infrastructure and e-Services for Developing …, 2022 | 4 | 2022 |
Characterizing mobile money phishing using reinforcement learning AN Njoya, VLT Ngongag, F Tchakounté, M Atemkeng, C Fachkha IEEE Access 11, 103839-103862, 2023 | 3 | 2023 |
True Request–Fake Response: A New Trend of Spear Phishing Attack F Tchakounté, VS Nyassi, KP Udagepola Journal of Network Security 7 (3), 1-17, 2019 | 3 | 2019 |
Understanding of the Behaviour of Android Smartphone Users in Cameroon: Application of the Security F Tchakounté, P Dayang, J Nlong, N Check Open J. Inf. Secur. Appl, 9-20, 2014 | 3 | 2014 |