default search action
Assane Gueye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Bernard Odartei Lamptey, Assane Gueye, Mohammed Seidu, Edith Luhanga, Karen Sowon:
Demo: A Low-Cost Honeynet Infrastructure For Smishing Data Collection. COMPASS 2024: 248-251 - [c30]Veronica Muriga, Swarun Kumar, Akshitha Sriraman, Assane Gueye:
A Road map for the Democratization of Space-Based Communications. HotNets 2024: 17-24 - [c29]Erick Semindu, Pamely Zantou, Eyerusalem Birhan, Semebia Y. Wurah, Theophilus Benson, Assane Gueye:
Poster: Towards A Low-Cost Mobile Internet Measurement Infrastructure: An Initial Deployment in Africa. IMC 2024: 791-792 - [c28]Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania. SP 2024: 752-769 - [i9]Pamely Zantou, Blessed Guda, Bereket Retta, Gladys Inabeza, Carlee Joe-Wong, Assane Gueye:
HumekaFL: Automated Detection of Neonatal Asphyxia Using Federated Learning. CoRR abs/2412.01167 (2024) - [i8]Karen Sowon, Collins W. Munyendo, Lily Klucinec, Eunice Maingi, Gerald Suleh, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya. CoRR abs/2412.18716 (2024) - 2023
- [j5]Assane Gueye, Carlos Eduardo Galhardo, Irena Bojanova:
Critical Software Security Weaknesses. IT Prof. 25(4): 11-16 (2023) - [c27]Trevor Henry Chiboora, Lenah Chacha, Theoneste Byagutangaza, Assane Gueye:
Evaluating Mobile Banking Application Security Posture Using the OWASP's MASVS Framework. COMPASS 2023: 99-106 - [c26]Andrew Amstrong Musoke, Jean Paul Nishimirwe, Nafiu Lawal, Assane Gueye:
Digital Public Goods Interoperability: A Low-Code Middleware Approach. COMPASS 2023: 138-141 - [c25]Amy Sene, Ibrahima Niang, Alassane Diop, Assane Gueye:
F4PW: Fog Computer for Pregnant Women. InterSol 2023: 391-402 - [c24]Xiyu Deng, Christian Kurniawan, Adhiraj Chakraborty, Assane Gueye, Niangjun Chen, Yorie Nakahira:
A Learning and Control Perspective for Microfinance. L4DC 2023: 915-927 - [i7]Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania. CoRR abs/2309.00226 (2023) - [i6]Edith Luhanga, Karen Sowon, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye:
User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania. CoRR abs/2311.00830 (2023) - 2022
- [e6]Abdulhameed Danjuma Mambo, Assane Gueye, Ghada Bassioni:
Innovations and Interdisciplinary Solutions for Underserved Areas - 5th EAI International Conference, InterSol 2022, Abuja, Nigeria, March 23-24, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 449, Springer 2022, ISBN 978-3-031-23115-5 [contents] - [i5]Christian Kurniawan, Xiyu Deng, Adhiraj Chakraborty, Assane Gueye, Niangjun Chen, Yorie Nakahira:
A Learning and Control Perspective for Microfinance. CoRR abs/2207.12631 (2022) - 2021
- [j4]Assane Gueye, Carlos E. C. Galhardo, Irena Bojanova, Peter Mell:
A Decade of Reoccurring Software Weaknesses. IEEE Secur. Priv. 19(6): 74-82 (2021) - [e5]Rafik Zitouni, Amreesh Phokeer, Josiah Chavula, Ahmed Elmokashfi, Assane Gueye, Nabil Benamar:
Towards new e-Infrastructure and e-Services for Developing Countries - 12th EAI International Conference, AFRICOMM 2020, Ebène City, Mauritius, December 2-4, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 361, Springer 2021, ISBN 978-3-030-70571-8 [contents] - [i4]Assane Gueye, Peter Mell:
A Historical and Statistical Studyof the Software Vulnerability Landscape. CoRR abs/2102.01722 (2021) - [i3]Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:
Measurements of the Most Significant Software Security Weaknesses. CoRR abs/2104.05375 (2021) - 2020
- [c23]Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:
Measurements of the Most Significant Software Security Weaknesses. ACSAC 2020: 154-164 - [c22]Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. COMPSAC 2020: 511-516 - [c21]Assane Gueye, Babacar Mbaye, Doudou Fall, Alassane Diop, Shigeru Kashihara:
A Matrix Model to Analyze Cascading Failure in Critical Infrastructures. InterSol 2020: 211-223 - [e4]Jessica P. R. Thorn, Assane Gueye, Adam P. Hejnowicz:
Innovations and Interdisciplinary Solutions for Underserved Areas - 4th EAI International Conference, InterSol 2020, Nairobi, Kenya, March 8-9, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 321, Springer 2020, ISBN 978-3-030-51050-3 [contents] - [i2]Peter Mell, Assane Gueye:
A Suite of Metrics for Calculating the Most Significant Security Relevant Software Flaw Types. CoRR abs/2006.08524 (2020)
2010 – 2019
- 2019
- [c20]Bounama Gueye, Amadou Dahirou Gueye, Assane Gueye, Omar Kassé, Claude Lishou:
Poster: Proposal of an Intelligent Remote Tutoring Model. IMCL 2019: 297-306 - [c19]Pape Moussa Sonko, Diery Ngom, Mouhamed Ouesse, Assane Gueye:
An Optimized, Low-Cost Off-grid Solar System: Design and Implementation. InterSol 2019: 38-49 - [c18]Babacar Mbaye, Assane Gueye, Désiré Bansé, Alassane Diop:
Africa's Online Access: What Data Is Getting Accessed and Where It Is Hosted? InterSol 2019: 50-61 - [e3]Ghada Bassioni, Cheikh M. F. Kébé, Assane Gueye, Ababacar Ndiaye:
Innovations and Interdisciplinary Solutions for Underserved Areas - Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14-15, 2019, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 296, Springer 2019, ISBN 978-3-030-34862-5 [contents] - [i1]Peter Mell, Assane Gueye, Christopher Schanzle:
Quantifying Information Exposure in Internet Routing. CoRR abs/1906.11061 (2019) - 2018
- [c17]Assane Gueye, Babacar Mbaye:
On the Prevalence of Boomerang Routing in Africa: Analysis and Potential Solutions. InterSol 2018: 3-12 - [c16]Zoutene Pabame, Cheikh Mouhamed Fadel Kébé, Boudy Ould Bilal, Ababacar Ndiaye, Assane Gueye, Pape Alioune Ndiaye:
A Study of the Wind Potential in Climatic Zones of Chad. InterSol 2018: 100-107 - [c15]Peter Mell, Assane Gueye, Christopher Schanzle:
Quantifying Information Exposure in Internet Routing. TrustCom/BigDataSE 2018: 1619-1623 - [e2]Cheikh M. F. Kébé, Assane Gueye, Ababacar Ndiaye:
Innovation and Interdisciplinary Solutions for Underserved Areas - First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11-12, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 204, Springer 2018, ISBN 978-3-319-72964-0 [contents] - [e1]Cheikh M. F. Kébé, Assane Gueye, Ababacar Ndiaye, Aminata A. Garba:
Innovations and Interdisciplinary Solutions for Underserved Areas - Second International Conference, InterSol 2018, Kigali, Rwanda, March 24-25, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 249, Springer 2018, ISBN 978-3-319-98877-1 [contents] - 2017
- [j3]Babacar Mbaye, Assane Gueye:
An Alert System on the Presence of Myriapods in Peanut Farms in Senegal. EAI Endorsed Trans. Collab. Comput. 3(12): e1 (2017) - [c14]I. Diallo, Assane Gueye, Omar Sene, M. Kare, P. I. Ndiaye, P. Diouf, Madiop Diouf, A. Dieng, Amy Sene, I. P. Thiao:
Impact of the Utilization of the Biodigester in the Populations of Bambey and Perspectives for Mass Adoption and Valorization. InterSol/CNRIA 2017: 81-93 - [c13]Assane Gueye, Charif Mahmoudi, O. I. Elmimouni, M. L. Gueye, S. O. Ndiaye:
An Opportunistic Connectivity Network for Rural Areas in Senegal. InterSol/CNRIA 2017: 131-137 - 2015
- [j2]Aron Laszka, Assane Gueye:
Network Topology Vulnerability/Cost Trade-Off: Model, Application, and Computational Complexity. Internet Math. 11(6): 588-626 (2015) - [c12]Assane Gueye, Peter Mell, Désiré Bansé, Faical Y. Congo:
On the Internet Connectivity in Africa. AFRICOMM 2015: 70-77 - [c11]Assane Gueye, Peter Mell, Richard E. Harang, Richard J. La:
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks. DBSec 2015: 261-276 - 2014
- [j1]Aron Laszka, Assane Gueye:
Quantifying all-to-one network topology robustness under budget constraints. SIGMETRICS Perform. Evaluation Rev. 41(4): 8-11 (2014) - 2013
- [c10]Aron Laszka, Assane Gueye:
Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity. GameSec 2013: 154-174 - 2012
- [c9]Assane Gueye, Vladimir Marbukh, Jean C. Walrand:
Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach. GAMENETS 2012: 259-274 - [c8]Assane Gueye, Vladimir Marbukh:
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation. GameSec 2012: 186-200 - 2011
- [c7]Galina A. Schwartz, Saurabh Amin, Assane Gueye, Jean C. Walrand:
Network design game with both reliability and security failures. Allerton 2011: 675-681 - [c6]Assane Gueye, Jean C. Walrand, Venkat Anantharam:
How to Choose Communication Links in an Adversarial Environment? GAMENETS 2011: 233-248 - 2010
- [c5]Assane Gueye, Jean C. Walrand, Venkat Anantharam:
Design of Network Topology in an Adversarial Environment. GameSec 2010: 1-20
2000 – 2009
- 2009
- [c4]Assane Gueye, Sinem Coleri Ergen, Alberto L. Sangiovanni-Vincentelli:
Iterative Node Deployment in an Unknown Environment. GLOBECOM 2009: 1-6 - 2008
- [c3]Assane Gueye, Jean C. Walrand:
Security in networks: A game-theoretic approach. CDC 2008: 829-834 - [c2]Laurent El Ghaoui, Assane Gueye:
A Convex Upper Bound on the Log-Partition Function for Binary Distributions. NIPS 2008: 409-416 - [c1]Nikhil Shetty, Assane Gueye, Jean C. Walrand:
A novel approach to bottleneck analysis in networks. NOMS 2008: 65-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint