Browsing byAuthorHoang, DB

Jump to a point in the index:
Showing results 1 to 20 of 117  next >
Issue DateTitleAuthor(s)
2021-06-01Policy-based Interaction Model for Detection and Prediction of Cloud Security BreachesFarahmandian, S; Hoang, DB
2020-11-26A Policy-based Interaction Protocol between Software Defined Security Controller and Virtual Security FunctionsFarahmandian, S; Hoang, DB
2020Congestion-Aware and Energy-Aware Virtual Network EmbeddingPham, M; Hoang, DB; Chaczko, Z
2019-05-17Toward an Active Aging Society: An IT Model to Engage the Aging PopulationHa, TV; Hoang, DB
2019-01-16S-MANAGE Protocol for Software-Defined IoTNguyen, TMC; Hoang, DB
2019-01-16Security threat probability computation using Markov Chain and Common Vulnerability Scoring SystemLe, NT; Hoang, DB
2019-01-01S-MANAGE protocol for provisioning IoT applications on demandNguyen, TMC; Hoang, DB
2019-01-01A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud SecurityLe, NT; Hoang, DB
2018-04-19A software-defined model for IoT clusters: Enabling applications on demandNguyen, TMC; Hoang, DB; Dat Dang, T
2018-02-27An assistive healthcare platform for both social and service networking for engaging elderly peopleHa, TV; Hoang, DB
2017-12-15Toward a programmable software-defined IoT architecture for sensor service provision on demandNguyen, TMC; Hoang, DB; Dat Dang, T
2017-12-08SDS<inf>2</inf>: A novel software-defined security service for protecting cloud computing infrastructureFarahmandian, S; Hoang, DB
2017-11-30SDS2: A Novel Software-Defined Security Service for Protecting Cloud Computing InfrastructureFarahmandian, S; Hoang, DB
2017-11-10Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing TechnologiesHoang, DB; Farahmandian, S; Zhu, S; Scott-Hayward, S; Jacquib, L; Hill, R
2017-08-04FBRC: Optimization of task scheduling in Fog-based Region and CloudDang, THANHD; Hoang, DB
2017-05-01Can SDN Technology Be Transported to Software-Defined WSN/IoT?Nguyen, TMC; Hoang, DB; Chaczko, Z
2017-01-17Can maturity models support cyber security?Le, NT; Hoang, DB
2017-01-01Capability maturity model and metrics framework for cyber cloud securityLe, NT; Hoang, DB
2017Data Protection and Mobility Management for CloudDang, D; Hoang, DB; Nanda, P; Kumar, V; Ko, R; Chaisiri, S