Lightweight self-protecting JavaScript PH Phung, D Sands, A Chudnov Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 194 | 2009 |
JSand: Complete client-side sandboxing of third-party JavaScript without browser modifications P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012 | 138 | 2012 |
Vehicle ECU classification based on safety-security characteristics DK Nilsson, PH Phung, UE Larson Road Transport Information and Control-RTIC 2008 and ITS United Kingdom …, 2008 | 101 | 2008 |
HIT4Mal: Hybrid image transformation for malware classification DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung Transactions on Emerning Telecommunications Technologies, 2020 | 89 | 2020 |
Safe wrappers and sane policies for self protecting JavaScript J Magazinius, PH Phung, D Sands Nordic Conference on Secure IT Systems, 239-255, 2010 | 88 | 2010 |
A convolutional transformation network for malware classification DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung 2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 234-239, 2019 | 69 | 2019 |
MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web PN Hiremath, J Armentrout, S Vu, TN Nguyen, QT Minh, PH Phung FDSE 2019: Future Data and Security Engineering 11814 (Lecture Notes in …, 2019 | 45 | 2019 |
Security policy enforcement in the OSGi framework using aspect-oriented programming PH Phung, D Sands 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 31 | 2008 |
An airfare prediction model for developing markets VH Vu, QT Minh, PH Phung 2018 International Conference on Information Networking (ICOIN), 765-770, 2018 | 30 | 2018 |
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-party Web Content P Phung, M Monshizadeh, M Sridhar, K Hamlen, V Venkatakrishnan IEEE Transactions of Dependable and Secure Computing 12 (4), 443-457, 2015 | 29 | 2015 |
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning. I Obaidata, M Sridhar, KM Pham, PH Phung Computers & Security, 2021 | 26 | 2021 |
HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications PH Phung, A Mohanty, R Rachapalli, M Sridhar Mobile Security Technologies (MoST), 147-156, 2017 | 25 | 2017 |
A two-tier sandbox architecture for untrusted JavaScript PH Phung, L Desmet Proceedings of the Workshop on JavaScript Tools, 1-10, 2012 | 19 | 2012 |
SAFESCRIPT: JavaScript Transformation for Policy Enforcement M Ter Louw, PH Phung, R Krishnamurti, VN Venkatakrishnan Secure IT Systems, 67-83, 2013 | 17 | 2013 |
A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring D Nguyen, PH Phung 2017 International Conference on Intelligent Environments (IE), 84-91, 2017 | 16 | 2017 |
P4SINC–An Execution Policy Framework for IoT Services in the Edge PH Phung, HL Truong, DT Yasoju International Congress on Internet of Things (ICIOT), 137-142, 2017 | 16 | 2017 |
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge PH Nguyen, PH Phung, HL Truong Proceedings of the 8th International Conference on the Internet of Things, 4, 2018 | 14 | 2018 |
Toward An IoT-based Expert System for Heart Disease Diagnosis DT Thai, QT Minh, PH Phung The 28th Modern Artificial Intelligence and Cognitive Science Conference …, 2017 | 14 | 2017 |
From verification to optimizations R Gjomemo, KS Namjoshi, PH Phung, VN Venkatakrishnan, LD Zuck Verification, Model Checking, and Abstract Interpretation, 300-317, 2015 | 14 | 2015 |
Securing AODV routing protocol in mobile ad-hoc networks P Phu, M Yi, MK Kim Active and Programmable Networks, 182-187, 2009 | 14 | 2009 |