Follow
Viet Hung Nguyen
Viet Hung Nguyen
University of Trento
No verified email - Homepage
Title
Cited by
Cited by
Year
Predicting vulnerable software components with dependency graphs
VH Nguyen, LMS Tran
Proceedings of the 6th International Workshop on Security Measurements and …, 2010
1322010
Which is the right source for vulnerability studies? an empirical analysis on mozilla firefox
F Massacci, VH Nguyen
Proceedings of the 6th international workshop on security measurements and …, 2010
782010
The (un) reliability of nvd vulnerable versions data: An empirical experiment on google chrome vulnerabilities
VH Nguyen, F Massacci
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
602013
An Empirical Methodology to Validate Vulnerability Discovery Models
F Massacci, VH Nguyen
IEEE Transactions on Software Engineering, 2014
592014
An automatic method for assessing the versions affected by a vulnerability
VH Nguyen, S Dashevskyi, F Massacci
Empirical Software Engineering 21, 2268-2297, 2016
482016
After-life vulnerabilities: a study on firefox evolution, its vulnerabilities, and fixes
F Massacci, S Neuhaus, VH Nguyen
Engineering Secure Software and Systems: Third International Symposium …, 2011
472011
No purpose, no data: Goal-oriented access control forambient assisted living
F Massacci, VH Nguyen, A Saidane
Proceedings of the first ACM workshop on Security and privacy in medical and …, 2009
192009
An independent validation of vulnerability discovery models
VH Nguyen, F Massacci
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
172012
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases.
VH Nguyen, TK Dang
J. Softw. 3 (4), 9-16, 2008
132008
Query assurance verification for dynamic outsourced XML databases
VH Nguyen, TK Dang, NT Son, J Kung
The Second International Conference on Availability, Reliability and …, 2007
122007
An idea of an independent validation of vulnerability discovery models
VH Nguyen, F Massacci
Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012
72012
Goal-oriented access control model for ambient assisted living
F Massacci, V Hung Nguyen
Privacy and Identity Management for Life: 5th IFIP WG 9.2, 9.6/11.4, 11.6 …, 2010
72010
Empirical Methods for Evaluating Vulnerability Models
VH Nguyen
University of Trento, 2014
2014
Do Vulnerability Studies Make Sense?
F Massacci, S Neuhaus, VH Nguyen
The (Un) Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Browsers’ Vulnerabilities
VH Nguyen, F Massacci
THE EVOLUTION OF SOFTWARE VULNERABILITIES
VH Nguyen
The system can't perform the operation now. Try again later.
Articles 1–16