Browsing by Author Hoang, D

Showing results 1 to 20 of 40  next >
Issue DateTitleAuthor(s)
15-Dec-2018FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc NetworksHoang, D; Luong, NT; Vo, TT
21-Nov-2018Security threat probability computation using Markov Chain and Vulnerability Scoring SystemHoang, D; Le, NT
21-Nov-2018S-MAMAGE Protocol for Software-Define IoTHoang, D; Nguyen, TMC
27-Jul-2018Dirichlet-Based Initial Trust Establishment for Personal Space IoT SystemsNguyen, T; Hoang, D; Seneviratne, A
3-Jul-2018Exploring challenge-response mechanism designs for IoT initial trust establishmentNguyen, T; Hoang, D; Seneviratne, A
20-Nov-2017Initial trust establishment for personal space IoT systemsNguyen, T; Hoang, D; Nguyen, D; Seneviratne, A
7-Sep-2017FBRC: Optimization of task scheduling in fog-based region and cloudHoang, D; Dang, TD
12-Jun-2017A data protection model for fog computingDang, TD; Hoang, D
13-Jan-2017An intent-based network virtualization platform for SDNHan, Y; Li, J; Hoang, D; Yoo, JH; Hong, JWK
23-Nov-2016Data Mobility as a ServiceDang, TD; Hoang, D
23-Aug-2016A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health RecordsDang, TD; Hoang, D; Nanda, P
19-Apr-2016Challenge-response trust assessment model for personal space IoTNguyen, T; Hoang, D; Seneviratne, A
1-Jan-2016A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health recordsDang, TD; Hoang, D; Nanda, P
2-Dec-2015Data mobility management model for active data cubesDang, TD; Hoang, D; Nanda, P
1-Jan-2014A hybrid domain enhanced framework for video retargeting with spatial-temporal importance and 3D grid optimizationWang, J; Xu, M; He, X; Lu, H; Hoang, D
12-Sep-2013Visual analytics for intrusion detection in spam emailsZhang, J; Huang, ML; Hoang, D
1-Dec-2010Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
20-Jul-2010Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
4-Dec-2009A congestion control framework for handling video surveillance traffics on WSNMaimour, M; Pham, C; Hoang, D
1-Dec-2009Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D