On the advantages of deploying a large scale distributed honeypot platform F Pouget, M Dacier, VH Pham proceedings of the e-crime and computer evidence conference, 2005 | 131 | 2005 |
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation PT Duy, DTT Hien, DH Hien, VH Pham Proceedings of the 9th International Symposium on Information and …, 2018 | 88 | 2018 |
Honeypot trace forensics: The observation viewpoint matters VH Pham, M Dacier Future Generation Computer Systems 27 (5), 539-546, 2011 | 63 | 2011 |
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 62 | 2008 |
The WOMBAT Attack Attribution method: some results M Dacier, VH Pham, O Thonnard International Conference on Information Systems Security, 19-37, 2009 | 49 | 2009 |
Collection and analysis of attack data based on honeypots deployed on the internet E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ... Quality of Protection: Security Measurements and Metrics, 79-91, 2006 | 44 | 2006 |
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks PT Duy, NH Khoa, AGT Nguyen, VH Pham Computers & Security 109, 102367, 2021 | 36 | 2021 |
The use of traditional Vietnamese medicine among Vietnamese immigrants attending an urban community health center in the United States LT Nguyen, TJ Kaptchuk, RB Davis, G Nguyen, V Pham, SM Tringale, ... The journal of alternative and complementary medicine 22 (2), 145-153, 2016 | 36 | 2016 |
Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for sdn forensics using blockchain PT Duy, H Do Hoang, NB Khanh, VH Pham 2019 6th NAFOSTED conference on information and computer science (NICS), 416-421, 2019 | 29 | 2019 |
Understanding threats: a prerequisite to enhance survivability of computing systems F Pouget, M Dacier, VH Pham International journal of critical infrastructures 4 (1-2), 153-171, 2008 | 29 | 2008 |
The quest for multi-headed worms VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary Detection of Intrusions and Malware, and Vulnerability Assessment: 5th …, 2008 | 23 | 2008 |
Parallel two-phase K-means CD Nguyen, DT Nguyen, VH Pham Computational Science and Its Applications–ICCSA 2013: 13th International …, 2013 | 20 | 2013 |
Honeynets: Foundations for the development of early warning information systems F Pouget, M Dacier, VH Pham, H Debar Cyberspace Security and Defense: Research Issues: Proceedings of the NATO …, 2005 | 20 | 2005 |
A security-enhanced monitoring system for northbound interface in SDN using blockchain HD Hoang, PT Duy, VH Pham Proceedings of the 10th International Symposium on Information and …, 2019 | 19 | 2019 |
Forensic analysis of TikTok application to seek digital artifacts on Android smartphone NH Khoa, PT Duy, H Do Hoang, VH Pham 2020 RIVF International Conference on Computing and Communication …, 2020 | 17 | 2020 |
Detect malware in android firmware based on distributed network environment NT Cam, T Nguyen, K Nguyen, T Nguyen, VH Pham 2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019 | 16 | 2019 |
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis LH Tuan, NT Cam, VH Pham Cluster Computing 22 (Suppl 1), 1079-1085, 2019 | 16 | 2019 |
Federated learning-based intrusion detection in SDN-enabled IIoT networks PT Duy, T Van Hung, NH Ha, H Do Hoang, VH Pham 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), 424-429, 2021 | 15 | 2021 |
Federated learning-based intrusion detection in the context of IIoT networks: poisoning attack and defense NC Vy, NH Quyen, PT Duy, VH Pham Network and System Security: 15th International Conference, NSS 2021 …, 2021 | 15 | 2021 |
A role-based statistical mechanism for DDoS attack detection in SDN PT Duy, VH Pham 2018 5th NAFOSTED Conference on Information and Computer Science (NICS), 177-182, 2018 | 15 | 2018 |