On the advantages of deploying a large scale distributed honeypot platform F Pouget, M Dacier, VH Pham proceedings of the e-crime and computer evidence conference, 2005 | 121 | 2005 |
The plant growth-promoting effect of the nitrogen-fixing endophyte Pseudomonas stutzeri A15 VTK Pham, H Rediers, MGK Ghequire, HH Nguyen, R De Mot, ... Archives of microbiology 199 (3), 513-517, 2017 | 56 | 2017 |
Honeypot trace forensics: The observation viewpoint matters VH Pham, M Dacier Future Generation Computer Systems 27 (5), 539-546, 2011 | 56 | 2011 |
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ... 2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008 | 46 | 2008 |
The WOMBAT Attack Attribution method: some results M Dacier, VH Pham, O Thonnard International Conference on Information Systems Security, 19-37, 2009 | 34 | 2009 |
Collection and analysis of attack data based on honeypots deployed on the Internet E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ... Quality of Protection, 79-91, 2006 | 32 | 2006 |
Understanding threats: a prerequisite to enhance survivability of computing systems F Pouget, M Dacier, VH Pham IISW 4, 5-8, 2004 | 27* | 2004 |
Honeynets: Foundations for the development of early warning information systems F Pouget, M Dacier, VH Pham, H Debar Cyberspace Security and Defense: Research Issues, 231-257, 2005 | 19 | 2005 |
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation PT Duy, DTT Hien, DH Hien, VH Pham Proceedings of the Ninth International Symposium on Information and …, 2018 | 17 | 2018 |
The quest for multi-headed worms VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary International Conference on Detection of Intrusions and Malware, and …, 2008 | 15 | 2008 |
Parallel two-phase K-means CD Nguyen, DT Nguyen, VH Pham International Conference on Computational Science and Its Applications, 224-231, 2013 | 12 | 2013 |
Extracting inter-arrival time based behaviour from honeypot traffic using cliques S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ... School of Computer and Information Science, Edith Cowan University, Perth …, 2007 | 11 | 2007 |
Assessing cybercrime through the eyes of the WOMBAT M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda Cyber Situational Awareness, 103-136, 2010 | 10 | 2010 |
Android security analysis based on inter-application relationships NT Cam, P Van Hau, T Nguyen Information Science and Applications (ICISA) 2016, 689-700, 2016 | 9 | 2016 |
Solving problems on a knowledge model of operators and application HD Nguyen, NV Do, VT Pham, K Inoue International Journal of Digital Enterprise Technology 1 (1-2), 37-59, 2018 | 8 | 2018 |
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis LH Tuan, NT Cam, VH Pham Cluster Computing 22 (1), 1079-1085, 2019 | 7 | 2019 |
Design an intelligent problem solver in solid geometry based on knowledge model about relations HD Nguyen, D Nguyen, VT Pham 2016 Eighth International Conference on Knowledge and Systems Engineering …, 2016 | 7 | 2016 |
A Mathematical Approach for Representing Knowledge about Relations and Its Application HD Nguyen, VT Pham, TT Le, DH Tran 2015 Seventh International Conference on Knowledge and Systems Engineering …, 2015 | 7 | 2015 |
CADHo: Collection and Analysis of Data from Honeypots E Alata, M Dacier, Y Deswarte, M Kaaniche, K Kortchinsky, V Nicomette, ... Proceedings of 5th European Dependable Computing Conference, 2005 | 6 | 2005 |
Understanding threats: a prerequisite to enhance survivability of computing systems F Pouget, M Dacier, VH Pham International journal of critical infrastructures 4 (1-2), 153-171, 2008 | 5 | 2008 |