Browsing byAuthorHoang, DB

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 94 to 113 of 117< previous   next >
Issue DateTitleAuthor(s)
2017-12-08SDS<inf>2</inf>: A novel software-defined security service for protecting cloud computing infrastructureFarahmandian, S; Hoang, DB
-Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterizationBernardo, DV; Hoang, DB
2016-12-23Security For Software-Defined (Cloud, SDN And NFV) Infrastructures – Issues And ChallengesFarahmandian, S; Hoang, DB
2009-01A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDTBernardo, DV; Hoang, DB
2017-11-10Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing TechnologiesHoang, DB; Farahmandian, S; Zhu, S; Scott-Hayward, S; Jacquib, L; Hill, R
2019-01-16Security threat probability computation using Markov Chain and Common Vulnerability Scoring SystemLe, NT; Hoang, DB
2005-09-26Service architecture for integrating MANETs with heterogeneous IP networksChan, JC; Hoang, DB
2006-03-06Serviter: A service-oriented programmable network platform for shared infrastructureYousef, B; Hoang, DB; Rogers, G
2008-12-01SOAP based assistive care loop using wireless sensor networksBalasubramanian, V; Hoang, DB; Ahmad, NF
2015-12-28Software Defined Networking – Shaping up for the next disruptive step?Hoang, DB
2018-04-19A software-defined model for IoT clusters: Enabling applications on demandNguyen, TMC; Hoang, DB; Dat Dang, T
2012-12-01Statistical analysis to extract effective parameters on overall energy consumption of Wireless Sensor Network (WSN)Kamyabpour, N; Hoang, DB
2012-05-14Symbolic analysis of the proposed UDT security architectureBernardo, DV; Hoang, DB
2011-12-01A task based sensor-centric model for overall energy consumptionKamyabpour, N; Hoang, DB
2019-01-01A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud SecurityLe, NT; Hoang, DB
2004-01Throughput and Fairness of Multiple TCP connections in Wireless NetworksZhou, H; Leis, J; Hoang, DB; Nhan, P; html, HWDWCWCFP
2017-12-15Toward a programmable software-defined IoT architecture for sensor service provision on demandNguyen, TMC; Hoang, DB; Dat Dang, T
2019-05-17Toward an Active Aging Society: An IT Model to Engage the Aging PopulationHa, TV; Hoang, DB
2011-12-01Towards scalable, fine-grained, intrusion-tolerant data protection models for healthcare cloudChen, L; Hoang, DB
2004-09-21Video-on-demand based on delayed-multicast: Algorithmic supportGlinos, N; Hoang, DB; Nguyen, C; Symvonis, A