Suivre
Franklin Tchakounté
Franklin Tchakounté
Associate Professor, Dpt Maths and Computer Science, Faculty of Science, University of Ngaoundere
Adresse e-mail validée de cycomai.com - Page d'accueil
Titre
Citée par
Citée par
Année
System Calls Analysis of Malwares on Android
F Tchakounté, P Dayang
International Journal of Science and Technology 2 (9), 669-674, 2013
612013
A smart contract logic to reduce hoax propagation across social media
F Tchakounté, KA Calvin, AAA Ari, DJF Mbogne
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
382022
Permission-based Malware Detection Mechanisms on Android: Analysis and Perspectives
F Tchakounté
Journal of Computer Science 1 (2), 2014
382014
Transfer learning for the detection and diagnosis of types of pneumonia including pneumonia induced by COVID-19 from chest X-ray images
Y Brima, M Atemkeng, S Tankio Djiokap, J Ebiele, F Tchakounté
Diagnostics 11 (8), 1480, 2021
272021
Supervised learning based detection of malware on android
F Tchakounté, F Hayata
Mobile Security and Privacy, 101-154, 2017
182017
A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News
F Tchakounté, A Faissal, M Atemkeng, A Ntyam
Information 11 (6), 1-25, 2020
172020
LimonDroid: a system coupling three signature-based schemes for profiling Android malware
F Tchakounté, RCN Ngassi, VC Kamla, KP Udagepola
Iran Journal of Computer Science 4, 95-114, 2021
162021
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
F Tchakounte, V Simé Nyassi, DE Houpa Danga, K Priyanath Udagepola, ...
EAI Endorsed Transactions on Scalable Information Systems, 2020
162020
A review of gamification applied to phishing
F Tchakounté, LK Wabo, M Atemkeng
Preprints, 2020
102020
Detection of Android Malware based on Sequence Alignment of Permissions
F Tchakounté, AD Wandala, Y Tiguiane
International Journal of Computer (IJC) 35 (1), 26-36, 2019
92019
A Description Logic Ontology for Email Phishing
F Tchakounté, D Molengar, JM Ngossaha
International Journal of Information Security Science 9 (1), 44-63, 2020
82020
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network
F Tchakounte, M Nakoe, BO Yenke, KP Udagepola
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (4 …, 2019
82019
An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images
F Tchakounté, P Chassem Kamdem, JC Kamgang, ...
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2020
72020
A Malware Detection System for Android
F Tchakounte
Universität Bremen, 2015
62015
Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism
F Tchakounte, JCT Ngnintedem, I Damakoa, F Ahmadou, FAK Fotso
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
52022
CIAA-RepDroid: a fine-grained and probabilistic reputation scheme for android apps based on sentiment analysis of reviews
F Tchakounté, AEY Pagor, JC Kamgang, M Atemkeng
Future Internet 12 (9), 145, 2020
52020
Understanding of the Behaviour of Android Smartphone Users in Cameroon: Application of the Security
F Tchakounté, P Dayang, J Nlong, N Check
Open J. Inf. Secur. Appl, 9-20, 2014
42014
A Gamification Architecture to Enhance Phishing Awareness
JE Ntsama, C Fachkha, PB Owomo, AC Focho
International Conference on Safe, Secure, Ethical, Responsible Technologies …, 2023
32023
True Request–Fake Response: A New Trend of Spear Phishing Attack
F Tchakounté, VS Nyassi, KP Udagepola
Journal of Network Security 7 (3), 1-17, 2019
32019
An Enhanced Dissection of Attacks in Wireless Sensor Networks
B Savoudsou, F Tchakounté, BO Yenke, T Yélémou, M Atemkeng
International Journal of Computing and Digital Systems 14 (1), 1-1, 2023
22023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20