Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Adresse e-mail validée de
Citée par
Citée par
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
Honeypot trace forensics: The observation viewpoint matters
VH Pham, M Dacier
Future Generation Computer Systems 27 (5), 539-546, 2011
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
The plant growth-promoting effect of the nitrogen-fixing endophyte Pseudomonas stutzeri A15
VTK Pham, H Rediers, MGK Ghequire, HH Nguyen, R De Mot, ...
Archives of microbiology 199 (3), 513-517, 2017
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
IISW 4, 5-8, 2004
Honeynets: Foundations for the development of early warning information systems
F Pouget, M Dacier, VH Pham, H Debar
Cyberspace Security and Defense: Research Issues, 231-257, 2005
The quest for multi-headed worms
VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary
International Conference on Detection of Intrusions and Malware, and …, 2008
Parallel two-phase K-means
CD Nguyen, DT Nguyen, VH Pham
International Conference on Computational Science and Its Applications, 224-231, 2013
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation
PT Duy, DTT Hien, DH Hien, VH Pham
Proceedings of the Ninth International Symposium on Information and …, 2018
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda
Cyber Situational Awareness, 103-136, 2010
Solving problems on a knowledge model of operators and application
HD Nguyen, NV Do, VT Pham, K Inoue
International Journal of Digital Enterprise Technology 1 (1-2), 37-59, 2018
A Mathematical Approach for Representing Knowledge about Relations and Its Application
HD Nguyen, VT Pham, TT Le, DH Tran
2015 Seventh International Conference on Knowledge and Systems Engineering …, 2015
Design an intelligent problem solver in solid geometry based on knowledge model about relations
HD Nguyen, D Nguyen, VT Pham
2016 Eighth International Conference on Knowledge and Systems Engineering …, 2016
Android security analysis based on inter-application relationships
NT Cam, P Van Hau, T Nguyen
Information Science and Applications (ICISA) 2016, 689-700, 2016
CADHo: Collection and Analysis of Data from Honeypots
E Alata, M Dacier, Y Deswarte, M Kaaniche, K Kortchinsky, V Nicomette, ...
Proceedings of 5th European Dependable Computing Conference, 2005
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
International journal of critical infrastructures 4 (1-2), 153-171, 2008
A role-based statistical mechanism for DDoS attack detection in SDN
PT Duy, VH Pham
2018 5th NAFOSTED Conference on Information and Computer Science (NICS), 177-182, 2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20