Follow
Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Verified email at uit.edu.vn
Title
Cited by
Cited by
Year
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
1302005
Honeypot trace forensics: The observation viewpoint matters
VH Pham, M Dacier
Future Generation Computer Systems 27 (5), 539-546, 2011
612011
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation
PT Duy, DTT Hien, DH Hien, VH Pham
Proceedings of the ninth international symposium on information and …, 2018
592018
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
552008
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
412009
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
392006
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
IISW 4, 5-8, 2004
29*2004
Honeynets: Foundations for the development of early warning information systems
F Pouget, M Dacier, VH Pham, H Debar
Cyberspace Security and Defense: Research Issues, 231-257, 2005
202005
The quest for multi-headed worms
VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary
International Conference on Detection of Intrusions and Malware, and …, 2008
172008
Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for sdn forensics using blockchain
PT Duy, H Do Hoang, NB Khanh, VH Pham
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 416-421, 2019
162019
Parallel two-phase K-means
CD Nguyen, DT Nguyen, VH Pham
International Conference on Computational Science and Its Applications, 224-231, 2013
142013
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
142007
A role-based statistical mechanism for DDoS attack detection in SDN
PT Duy, VH Pham
2018 5th NAFOSTED Conference on Information and Computer Science (NICS), 177-182, 2018
132018
Android security analysis based on inter-application relationships
NT Cam, PV Hau, T Nguyen
Information Science and Applications (ICISA) 2016, 689-700, 2016
122016
Forensic analysis of tiktok application to seek digital artifacts on android smartphone
NH Khoa, PT Duy, H Do Hoang, VH Pham
2020 RIVF International Conference on Computing and Communication …, 2020
112020
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
LH Tuan, NT Cam, VH Pham
Cluster Computing 22 (1), 1079-1085, 2019
112019
A security-enhanced monitoring system for northbound interface in SDN using blockchain
HD Hoang, PT Duy, VH Pham
Proceedings of the Tenth International Symposium on Information and …, 2019
102019
Detect malware in android firmware based on distributed network environment
NT Cam, T Nguyen, K Nguyen, T Nguyen, VH Pham
2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019
102019
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, HV Pham, E Kirda
Cyber Situational Awareness, 103-136, 2010
102010
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
NT Cam, VH Pham, T Nguyen
Cluster Computing 22 (1), 1055-1064, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–20