Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Adresse e-mail validée de uit.edu.vn
Titre
Citée par
Citée par
Année
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
1212005
Honeypot trace forensics: The observation viewpoint matters
VH Pham, M Dacier
Future Generation Computer Systems 27 (5), 539-546, 2011
542011
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
452008
The plant growth-promoting effect of the nitrogen-fixing endophyte Pseudomonas stutzeri A15
VTK Pham, H Rediers, MGK Ghequire, HH Nguyen, R De Mot, ...
Archives of microbiology 199 (3), 513-517, 2017
412017
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
322009
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
302006
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
IISW 4, 5-8, 2004
27*2004
Honeynets: Foundations for the development of early warning information systems
F Pouget, M Dacier, VH Pham, H Debar
Cyberspace Security and Defense: Research Issues, 231-257, 2005
192005
The quest for multi-headed worms
VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary
International Conference on Detection of Intrusions and Malware, and …, 2008
152008
Parallel two-phase K-means
CD Nguyen, DT Nguyen, VH Pham
International Conference on Computational Science and Its Applications, 224-231, 2013
112013
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
112007
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation
PT Duy, DTT Hien, DH Hien, VH Pham
Proceedings of the Ninth International Symposium on Information and …, 2018
102018
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda
Cyber Situational Awareness, 103-136, 2010
102010
Solving problems on a knowledge model of operators and application
HD Nguyen, NV Do, VT Pham, K Inoue
International Journal of Digital Enterprise Technology 1 (1-2), 37-59, 2018
82018
A Mathematical Approach for Representing Knowledge about Relations and Its Application
HD Nguyen, VT Pham, TT Le, DH Tran
2015 Seventh International Conference on Knowledge and Systems Engineering …, 2015
72015
Design an intelligent problem solver in solid geometry based on knowledge model about relations
HD Nguyen, D Nguyen, VT Pham
2016 Eighth International Conference on Knowledge and Systems Engineering …, 2016
62016
Android security analysis based on inter-application relationships
NT Cam, P Van Hau, T Nguyen
Information Science and Applications (ICISA) 2016, 689-700, 2016
62016
CADHo: Collection and Analysis of Data from Honeypots
E Alata, M Dacier, Y Deswarte, M Kaaniche, K Kortchinsky, V Nicomette, ...
Proceedings of 5th European Dependable Computing Conference, 2005
62005
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
International journal of critical infrastructures 4 (1-2), 153-171, 2008
52008
A role-based statistical mechanism for DDoS attack detection in SDN
PT Duy, VH Pham
2018 5th NAFOSTED Conference on Information and Computer Science (NICS), 177-182, 2018
42018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20