Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Verified email at
Cited by
Cited by
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
Honeypot trace forensics: The observation viewpoint matters
VH Pham, M Dacier
Future Generation Computer Systems 27 (5), 539-546, 2011
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation
PT Duy, DTT Hien, DH Hien, VH Pham
Proceedings of the ninth international symposium on information and …, 2018
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
IISW 4, 5-8, 2004
Honeynets: Foundations for the development of early warning information systems
F Pouget, M Dacier, VH Pham, H Debar
Cyberspace Security and Defense: Research Issues, 231-257, 2005
The quest for multi-headed worms
VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary
International Conference on Detection of Intrusions and Malware, and …, 2008
Sdnlog-foren: Ensuring the integrity and tamper resistance of log files for sdn forensics using blockchain
PT Duy, H Do Hoang, NB Khanh, VH Pham
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 416-421, 2019
Parallel two-phase K-means
CD Nguyen, DT Nguyen, VH Pham
International Conference on Computational Science and Its Applications, 224-231, 2013
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
A role-based statistical mechanism for DDoS attack detection in SDN
PT Duy, VH Pham
2018 5th NAFOSTED Conference on Information and Computer Science (NICS), 177-182, 2018
Android security analysis based on inter-application relationships
NT Cam, PV Hau, T Nguyen
Information Science and Applications (ICISA) 2016, 689-700, 2016
Forensic analysis of tiktok application to seek digital artifacts on android smartphone
NH Khoa, PT Duy, H Do Hoang, VH Pham
2020 RIVF International Conference on Computing and Communication …, 2020
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
LH Tuan, NT Cam, VH Pham
Cluster Computing 22 (1), 1079-1085, 2019
A security-enhanced monitoring system for northbound interface in SDN using blockchain
HD Hoang, PT Duy, VH Pham
Proceedings of the Tenth International Symposium on Information and …, 2019
Detect malware in android firmware based on distributed network environment
NT Cam, T Nguyen, K Nguyen, T Nguyen, VH Pham
2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, HV Pham, E Kirda
Cyber Situational Awareness, 103-136, 2010
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique
NT Cam, VH Pham, T Nguyen
Cluster Computing 22 (1), 1055-1064, 2019
The system can't perform the operation now. Try again later.
Articles 1–20