PUBLICATIONS

PUBLICATIONS


2021


F Tchakounte, JCT Ngnintedem, I Damakoa, F Ahmadou, FAK Fotso. Crawl-shing: A focused crawler for fetching phishing contents based on graph isomorphism. Journal of King Saud University-Computer and Information Sciences 2021


Y Brima, M Atemkeng, S Tankio Djiokap, J Ebiele, F Tchakounté. Transfer Learning for the Detection and Diagnosis of Types of Pneumonia including Pneumonia Induced by COVID-19 from Chest X-ray Images. Diagnostics 11(8), 2021


F Tchakounté, RCN Ngassi, VC Kamla, KP Udagepola. LimonDroid: A system coupling three signature-based schemes for profiling Android malware. Iran Journal of Computer Science 4 (2), 95-114 2021



2020


F Tchakounté, P Chassem Kamdem, JC Kamgang . An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2020


F Tchakounte, V Simé Nyassi, DE Houpa Danga, K Priyanath Udagepola, Marcellin Atemkeng. A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies. EAI Endorsed Transactions on Scalable Information Systems, 8(30), 2020


F Tchakounté, KA Calvin, AAA Ari, DJF Mbogne. A smart contract logic to reduce hoax propagation across social media. Journal of King Saud University-Computer and Information Sciences, 2020


F Tchakounté, AE Yera Pagor, JC Kamgang, M Atemkeng. CIAA-RepDroid: a fine-grained and probabilistic reputation scheme for android apps based on sentiment analysis of reviews. Future Internet 12 (9), 2020


F Tchakounté, A Faissal, M Atemkeng, A Ntyam. A Reliable Weighting Scheme for the Aggregation of Crowd Intelligence to Detect Fake News. Information 11 (6), 1-25, 2020


F Tchakounté, LK Wabo, M Atemkeng. A review of gamification applied to phishing. Preprints 2020


F Tchakounté, D Molengar, JM Ngossaha. A Description Logic Ontology for Email Phishing. International Journal of Information Security Science 9 (1), 44-63, 2020



2019


F Tchakounte, M Nakoe, BO Yenke, KP Udagepola. Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (4), pp. 279-291, 2019


F Tchakounté, VS Nyassi, KP Udagepola. True Request–Fake Response: A New Trend of Spear Phishing Attack. Journal of Network Security 7 (3), pp. 1-17, 2019


F Tchakounté, JMK Fotso, VC Kamla. An Architecture for Misconfiguration Patching of Web Services: A Case Study of Apache Server. International Journal of Computer (IJC) 35 (1), 37-56. 2019


F Tchakounté, AD Wandala, Y Tiguiane. Detection of Android Malware based on Sequence Alignment of Permissions. International Journal of Computer (IJC) 35 (1), pp. 26-36. 2019



2017


P Dayang, T Efoumena, F Tchakounte. Monitoring Government Web Portals in Cameroon. International Journal of Cyber-Security and Digital Forensics 6 (3), 109-120. 2017



2015


Franklin Tchakounté. A Detection System for Android Malware. Doctoral Dissertation, University of Bremen, September 2015



2014


F Tchakounté, P Dayang, JM Nlong, N Check. Understanding of the Behaviour of Android Smartphone Users in Cameroon. In Open Journal of Information Security and Applications, Volume 1, N°2, pp.9–20. 2014


F Tchakounté. Permission-based Malware Detection Mechanisms: Analysis and Perspectives. In Journal of Computer Science and Software Application, Volume 1, N°2, pp. 63–77. 2014



2013


F. Tchakounte, P Dayang. System Calls Analysis of Malwares on Android. In International Journal of Science and Technology, Volume 2 N°9, pp 669–674. IJST Publications UK. 2013


F. Tchakounte, P Dayang. Qualitative Evaluation of Security Tools for Android. In International Journal of Science and Technology, Volume 2, N°11, pp 754–838. IJST Publications UK. 2013




CHAPTERS


Franklin Tchakounté, Francois Hayata 2016. Supervised Learning Based Detection of Malware on Android, in Mobile Security and Privacy, Man Ho Au, Kim-Kwang Raymond Choo, Syngress 2016.


Franklin Tchakounté. Grappes de Calcul Intensif: Déploiement, Exploitation et Performances. Éditions Universitaires Européennes, 2016




CONFERENCES


D Bassolé, Y Traoré, G Koala, F Tchakounté, O Sié. Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques. International Conference on Soft Computing and Pattern Recognition, 810-822, 2020

If you are interested, just joining us through our contacts