Do Hoang, Hien
1599  results:
Search for persons X
?
1

An interpretable approach for trustworthy intrusion detecti..:

Nguyen, Ngoc Tai ; Do Hoang, Hien ; Phan, The Duy.
CTU Journal of Innovation and Sustainable Development.  15 (2023)  ISDS - p. 12-19 , 2023
 
?
2

WebGuardRL: An Innovative Reinforcement Learning-based Appr..:

, In: Proceedings of the 12th International Symposium on Information and Communication Technology,
 
?
3

SDN-Based Cyber Deception Deployment for Proactive Defense ..:

, In: Intelligence of Things: Technologies and Applications; Lecture Notes on Data Engineering and Communications Technologies,
Khoa, Nghi Hoang ; Do Hoang, Hien ; Ngo-Khanh, Khoa.. - p. 269-278 , 2023
 
?
4

CVSS Based Attack Analysis Using a Graphical Security Model..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Smart Grid and Internet of Things,
Duy Le, Tan ; Ge, Mengmeng ; The Duy, Phan... - p. 116-134 , 2021
 
?
5

Forensic analysis of TikTok application to seek digital art..:

, In: 2020 RIVF International Conference on Computing and Communication Technologies (RIVF),
 
?
6

SDNLog-Foren: Ensuring the Integrity and Tamper Resistance ..:

, In: 2019 6th NAFOSTED Conference on Information and Computer Science (NICS),
Duy, Phan The ; Do Hoang, Hien ; Thu Hien, Do Thi.. - p. 416-421 , 2019
 
?
7

DeFL-BC: Empowering Reliable Cyberattack Detection through ..:

, In: 2023 RIVF International Conference on Computing and Communication Technologies (RIVF),
Duy, Phan The ; Tran, Tuan-Dung ; Duy, Hoang Nguyen.. - p. 515-520 , 2023
 
?
8

MalDEX: An Explainable Malware Detection System Based on En..:

, In: 2023 International Conference on Multimedia Analysis and Pattern Recognition (MAPR),
 
?
9

Investigating on the robustness of flow-based intrusion det..:

Duy, Phan The ; Khoa, Nghi Hoang ; Hien, Do Thi Thu..
Journal of Information Security and Applications.  74 (2023)  - p. 103472 , 2023
 
?
10

A Blockchain-based approach and Attribute-based Encryption ..:

, In: 2022 RIVF International Conference on Computing and Communication Technologies (RIVF),
 
?
11

Fool Your Enemies: Enable Cyber Deception and Moving Target..:

, In: 2022 21st International Symposium on Communications and Information Technologies (ISCIT),
 
?
12

B-DAC: A decentralized access control framework on Northbou..:

Duy, Phan The ; Hoang, Hien Do ; Hien, Do Thi Thu..
Journal of Information Security and Applications.  64 (2022)  - p. 103080 , 2022
 
?
13

DA-GAN: Domain Adaptation for Generative Adversarial Networ..:

, In: 2022 RIVF International Conference on Computing and Communication Technologies (RIVF),
 
?
14

A federated threat hunting system with big data analysis fo..:

, In: 2022 RIVF International Conference on Computing and Communication Technologies (RIVF),
 
?
15

A case study for evaluating learners' behaviors from online..:

, In: 2022 International Conference on Advanced Technologies for Communications (ATC),
Thu Hien, Do Thi ; Duy, Phan The ; Hoang, Hien Do.. - p. 251-256 , 2022
 
1-15