Van-Hau Pham
Van-Hau Pham
Lecturer of Information Security, University of Information Technology - VNU
Verified email at
Cited by
Cited by
On the advantages of deploying a large scale distributed honeypot platform
F Pouget, M Dacier, VH Pham
proceedings of the e-crime and computer evidence conference, 2005
The plant growth-promoting effect of the nitrogen-fixing endophyte Pseudomonas stutzeri A15
VTK Pham, H Rediers, MGK Ghequire, HH Nguyen, R De Mot, ...
Archives of microbiology 199 (3), 513-517, 2017
Honeypot trace forensics: The observation viewpoint matters
VH Pham, M Dacier
Future Generation Computer Systems 27 (5), 539-546, 2011
The leurre. com project: collecting internet threats information using a worldwide distributed honeynet
C Leita, VH Pham, O Thonnard, E Ramirez-Silva, F Pouget, E Kirda, ...
2008 WOMBAT Workshop on Information Security Threats Data Collection and …, 2008
The WOMBAT Attack Attribution method: some results
M Dacier, VH Pham, O Thonnard
International Conference on Information Systems Security, 19-37, 2009
Collection and analysis of attack data based on honeypots deployed on the Internet
E Alata, M Dacier, Y Deswarte, M Kaaâniche, K Kortchinsky, V Nicomette, ...
Quality of Protection, 79-91, 2006
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
IISW 4, 5-8, 2004
Honeynets: Foundations for the development of early warning information systems
F Pouget, M Dacier, VH Pham, H Debar
Cyberspace Security and Defense: Research Issues, 231-257, 2005
A survey on opportunities and challenges of Blockchain technology adoption for revolutionary innovation
PT Duy, DTT Hien, DH Hien, VH Pham
Proceedings of the Ninth International Symposium on Information and …, 2018
The quest for multi-headed worms
VH Pham, M Dacier, G Urvoy-Keller, T En-Najjary
International Conference on Detection of Intrusions and Malware, and …, 2008
Parallel two-phase K-means
CD Nguyen, DT Nguyen, VH Pham
International Conference on Computational Science and Its Applications, 224-231, 2013
Extracting inter-arrival time based behaviour from honeypot traffic using cliques
S Almotairi, A Clark, M Dacier, C Leita, G Mohay, VH Pham, O Thonnard, ...
School of Computer and Information Science, Edith Cowan University, Perth …, 2007
Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, H Van Pham, E Kirda
Cyber Situational Awareness, 103-136, 2010
Android security analysis based on inter-application relationships
NT Cam, P Van Hau, T Nguyen
Information Science and Applications (ICISA) 2016, 689-700, 2016
Solving problems on a knowledge model of operators and application
HD Nguyen, NV Do, VT Pham, K Inoue
International Journal of Digital Enterprise Technology 1 (1-2), 37-59, 2018
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis
LH Tuan, NT Cam, VH Pham
Cluster Computing 22 (1), 1079-1085, 2019
Design an intelligent problem solver in solid geometry based on knowledge model about relations
HD Nguyen, D Nguyen, VT Pham
2016 Eighth International Conference on Knowledge and Systems Engineering …, 2016
A Mathematical Approach for Representing Knowledge about Relations and Its Application
HD Nguyen, VT Pham, TT Le, DH Tran
2015 Seventh International Conference on Knowledge and Systems Engineering …, 2015
CADHo: Collection and Analysis of Data from Honeypots
E Alata, M Dacier, Y Deswarte, M Kaaniche, K Kortchinsky, V Nicomette, ...
Proceedings of 5th European Dependable Computing Conference, 2005
Understanding threats: a prerequisite to enhance survivability of computing systems
F Pouget, M Dacier, VH Pham
International journal of critical infrastructures 4 (1-2), 153-171, 2008
The system can't perform the operation now. Try again later.
Articles 1–20