Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication H Siadati, T Nguyen, P Gupta, J Markus, M Nasir Security, Privacy and User Interaction, 5-22, 2020 | 113 | 2020 |
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon Computers & Security 65, 14-28, 2017 | 113 | 2017 |
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices T Van Nguyen, N Sae-Bae, N Memon Computers & Security 66, 115-128, 2017 | 85 | 2017 |
Illusionpin: Shoulder-surfing resistant authentication using hybrid images A Papadopoulos, T Nguyen, E Durmus, N Memon IEEE Transactions on Information Forensics and Security 12 (12), 2875-2889, 2017 | 50 | 2017 |
A Deep Learning Model with Hierarchical LSTMs and Supervised Attention for Anti-Phishing M Nguyen, T Nguyen, T Nguyen Proceedings of the 1st Anti-Phishing Shared Pilot at 4th ACM International …, 2018 | 42 | 2018 |
Tap-based User Authentication for Smartwatches T Nguyen, N Memon Computer & Security, 2018 | 40 | 2018 |
Kid on the phone! Toward automatic detection of children on mobile devices T Nguyen, A Roy, N Memon Computers & Security 84, 334-348, 2019 | 38 | 2019 |
Smartwatches Locking Methods: A Comparative Study. T Nguyen, ND Memon SOUPS, 2017 | 35 | 2017 |
Finger-drawn PIN Authentication On Touch Devices T Nguyen, N Sae-Bae, N Memon Image Processing (ICIP), 2014 IEEE International Conference on, 5002-5006, 2014 | 28* | 2014 |
Spectral stability of noncharacteristic boundary layers of isentropic Navier–Stokes equations, to appear N Costanzino, J Humpherys, T Nguyen, K Zumbrun Arch. Rat. Mechanics and Anal, 0 | 11 | |
Verification Code Forwarding Attack H Siadati, T Nguyen, N Memon 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9 …, 2015 | 10* | 2015 |
X-platform phishing: Abusing trust for targeted attacks short paper H Siadati, T Nguyen, N Memon Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 5 | 2017 |
Detecting DGA Botnet based on Malware Behavior Analysis K Nguyen Quoc, T Bui, D Le, D Tran, T Nguyen, HT Nguyen Nguyen SoICT 2022: The 11th International Symposium on Information and …, 2022 | 3 | 2022 |
Crossing linguistic horizons: Finetuning and comprehensive evaluation of vietnamese large language models ST Truong, DQ Nguyen, T Nguyen, DD Le, NN Truong, T Quan, S Koyejo arXiv preprint arXiv:2403.02715, 2024 | 2 | 2024 |
Comparing network security specifications for a network to implement a network security policy for the network T Nguyen US Patent 11,405,426, 2022 | 2 | 2022 |
Comparing network security specifications across equivalent networks T Nguyen US Patent App. 16/675,678, 2021 | 2 | 2021 |
User Identification and Authentication on Emerging Interfaces T Van Nguyen New York University Tandon School of Engineering, 2018 | 2 | 2018 |
Hệ phần mềm nhận dạng vân tay tự động NTH Lan, NN Kỷ, NTH Thuỷ, NV Toàn Tạp chí Công nghệ thông tin và Truyền thông, 45-52, 2011 | 1 | 2011 |
Bảo mật truy cập dựa trên BioPKI và ứng dụng để bảo mật hệ nhận dạng vân tay C@ FRIS NV Toàn, NTH Thuỷ, NN Kỷ, NTH Lan Chuyên san tạp chí Thông tin, Khoa học công nghệ của Bộ Thông tin và Truyền …, 2011 | 1 | 2011 |
A note on the Prandtl layers Y Guo, T Nguyen arXiv preprint arXiv:1011.0130, 2010 | 1 | 2010 |