Követés
Franklin Tchakounté
Franklin Tchakounté
Associate Professor, Dpt Maths and Computer Science, Faculty of Science, University of Ngaoundere
E-mail megerősítve itt: cycomai.com - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
System Calls Analysis of Malwares on Android
F Tchakounté, P Dayang
International Journal of Science and Technology 2 (9), 669-674, 2013
652013
A smart contract logic to reduce hoax propagation across social media
F Tchakounté, KA Calvin, AAA Ari, DJF Mbogne
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
432022
Permission-based Malware Detection Mechanisms on Android: Analysis and Perspectives
F Tchakounté
Journal of Computer Science 1 (2), 2014
432014
Transfer learning for the detection and diagnosis of types of pneumonia including pneumonia induced by COVID-19 from chest X-ray images
Y Brima, M Atemkeng, S Tankio Djiokap, J Ebiele, F Tchakounté
Diagnostics 11 (8), 1480, 2021
322021
A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News
F Tchakounté, A Faissal, M Atemkeng, A Ntyam
Information 11 (6), 1-25, 2020
272020
LimonDroid: a system coupling three signature-based schemes for profiling Android malware
F Tchakounté, RCN Ngassi, VC Kamla, KP Udagepola
Iran Journal of Computer Science 4, 95-114, 2021
202021
Supervised learning based detection of malware on android
F Tchakounté, F Hayata
Mobile Security and Privacy, 101-154, 2017
192017
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
F Tchakounte, V Simé Nyassi, DE Houpa Danga, K Priyanath Udagepola, ...
EAI Endorsed Transactions on Scalable Information Systems, 2020
182020
Detection of Android Malware based on Sequence Alignment of Permissions
F Tchakounté, AD Wandala, Y Tiguiane
International Journal of Computer (IJC) 35 (1), 26-36, 2019
122019
A review of gamification applied to phishing
F Tchakounté, LK Wabo, M Atemkeng
Preprints, 2020
112020
A Description Logic Ontology for Email Phishing
F Tchakounté, D Molengar, JM Ngossaha
International Journal of Information Security Science 9 (1), 44-63, 2020
102020
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism
F Tchakounte, JCT Ngnintedem, I Damakoa, F Ahmadou, FAK Fotso
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
92022
An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images
F Tchakounté, P Chassem Kamdem, JC Kamgang, ...
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2020
82020
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network
F Tchakounte, M Nakoe, BO Yenke, KP Udagepola
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (4 …, 2019
82019
CIAA-RepDroid: a fine-grained and probabilistic reputation scheme for android apps based on sentiment analysis of reviews
F Tchakounté, AE Yera Pagor, JC Kamgang, M Atemkeng
Future Internet 12 (9), 145, 2020
72020
A Malware Detection System for Android
F Tchakounté
Universität Bremen, 2015
62015
Determinants of cybercrime victimization: Experiences and multi-stage recommendations from a survey in Cameroon
JE Ntsama, F Tchakounte, D Tchakounte Tchuimi, A Faissal, ...
International Conference on e-Infrastructure and e-Services for Developing …, 2022
42022
Characterizing mobile money phishing using reinforcement learning
AN Njoya, VLT Ngongag, F Tchakounté, M Atemkeng, C Fachkha
IEEE Access 11, 103839-103862, 2023
32023
True Request–Fake Response: A New Trend of Spear Phishing Attack
F Tchakounté, VS Nyassi, KP Udagepola
Journal of Network Security 7 (3), 1-17, 2019
32019
Understanding of the Behaviour of Android Smartphone Users in Cameroon: Application of the Security
F Tchakounté, P Dayang, J Nlong, N Check
Open J. Inf. Secur. Appl, 9-20, 2014
32014
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20