LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications
Hossain, Md Delwar, Inoue, Hiroyuki, Ochiai, Hideya, Fall, Doudou, Kadobayashi, Youki
Published in IEEE access (01.01.2020)
Published in IEEE access (01.01.2020)
Get full text
Journal Article
SSH and FTP brute-force Attacks Detection in Computer Networks: LSTM and Machine Learning Approaches
Hossain, Md Delwar, Ochiai, Hideya, Doudou, Fall, Kadobayashi, Youki
Published in 2020 5th International Conference on Computer and Communication Systems (ICCCS) (01.05.2020)
Published in 2020 5th International Conference on Computer and Communication Systems (ICCCS) (01.05.2020)
Get full text
Conference Proceeding
Risk Adaptive Authorization Mechanism (RAdAM) for Cloud Computing
Fall, Doudou, Okuda, Takeshi, Kadobayashi, Youki, Yamaguchi, Suguru
Published in Journal of Information Processing (01.01.2016)
Published in Journal of Information Processing (01.01.2016)
Get full text
Journal Article
Web-Biometrics for User Authenticity Verification in Zero Trust Access Control
Sasada, Taisho, Taenaka, Yuzo, Kadobayashi, Youki, Fall, Doudou
Published in IEEE access (11.06.2024)
Published in IEEE access (11.06.2024)
Get full text
Journal Article
Modulated Synchronous Taxiing: Mitigating Uncertainties Amid Ads-B Spoofing
Kamaruzzaman, Mohd Ruzeiny Bin, Fall, Doudou, Hossain, Md Delwar, Taenaka, Yuzo, Kadobayashi, Youki
Published in 2022 Integrated Communication, Navigation and Surveillance Conference (ICNS) (05.04.2022)
Published in 2022 Integrated Communication, Navigation and Surveillance Conference (ICNS) (05.04.2022)
Get full text
Conference Proceeding
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning
Hossain, Md Delwar, Ochiai, Hideya, Fall, Doudou, Kadobayashi, Youki
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01.08.2020)
Published in 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (01.08.2020)
Get full text
Conference Proceeding
Differentially-Private Text Generation via Text Preprocessing to Reduce Utility Loss
Sasada, Taisho, Kawai, Masataka, Taenaka, Yuzo, Fall, Doudou, Kadobayashi, Youki
Published in 2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (13.04.2021)
Published in 2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (13.04.2021)
Get full text
Conference Proceeding
The Best of Both Worlds: A New Composite Framework Leveraging PoS and PoW for Blockchain Security and Governance
BAUDLET, Matthias, FALL, Doudou, TAENAKA, Yuzo, KADOBAYASHI, Youki
Published in 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (01.09.2020)
Published in 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (01.09.2020)
Get full text
Conference Proceeding