Webshell detection techniques in web applications TD Tu, C Guang, G Xiaojun, P Wubin Fifth International Conference on Computing, Communications and Networking …, 2014 | 58 | 2014 |
Detecting domain‐flux botnet based on DNS traffic features in managed network DT Truong, G Cheng Security and Communication Networks 9 (14), 2338-2347, 2016 | 55 | 2016 |
Learning spatio-temporal features to detect manipulated facial videos created by the deepfake techniques XH Nguyen, TS Tran, KD Nguyen, DT Truong Forensic Science International: Digital Investigation 36, 301108, 2021 | 45 | 2021 |
Detecting bot-infected machines based on analyzing the similar periodic DNS queries TD Tu, C Guang, LY Xin 2015 International Conference on Communications, Management and …, 2015 | 21 | 2015 |
Detecting video inter-frame forgeries based on convolutional neural network model XH Nguyen, Y Hu, MA Amin, GH Khan, DT Truong International Journal of Image, Graphics and Signal Processing 10 (3), 1, 2020 | 14 | 2020 |
Progress in research on active network flow watermark XJ Guo, G Cheng, CG Zhu, DT Truong, A Zhou Journal on Communications 35 (7), 178-192, 2014 | 13 | 2014 |
Detecting DGA-based botnet with DNS traffic analysis in monitored network DT Truong, G Cheng, A Jakalan, XJ Guo, AP Zhou 網際網路技術學刊 17 (2), 217-230, 2016 | 11 | 2016 |
Make Your Webpage Carry Abundant Secret Information Unawarely X Guo, G Cheng, C Zhu, A Zhou, W Pan, D Truong 2013 IEEE 10th International Conference on High Performance Computing and …, 2013 | 8 | 2013 |
Detecting malicious Fast-Flux domains using feature-based classification techniques J DT Truong, DT Tran, B Huynh Journal of Internet Technology 21 (4), 1061-1072, 2020 | 7 | 2020 |
A novel search engine-based method for discovering command and control server X Guo, G Cheng, W Pan, T Dinhtu, Y Liang Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 4 | 2015 |
QoS prediction for web services based on user-trust propagation model LV Thinh, TD Tu New Review of Hypermedia and Multimedia 23 (4), 277-291, 2017 | 3 | 2017 |
User-based AutoenCoder for QoS prediction LV Thinh, NX Hau, TD Tu 2016 7th IEEE International Conference on Software Engineering and Service …, 2016 | 3* | 2016 |
Three-dimensional Region Forgery Detection and Localization in Videos XH Nguyen, Y Hu, MA Amin, GH Khan, DT Truong International Journal of Image, Graphics and Signal Processing 11 (12), 1, 2019 | 2 | 2019 |
Detection of DoS, DDoS attacks in software-defined networking DT Truong, KD Tran, QB Nguyen, DT Tran Research in Intelligent and Computing in Engineering: Select Proceedings of …, 2021 | 1 | 2021 |
Heavy hitter identification based on adaptive sampling with mapreduce A Zhou, G Cheng, X Guo, DT Truong, C Zhu COMPUTER SYSTEMS SCIENCE AND ENGINEERING 30 (6), 451-459, 2015 | | 2015 |
Evil-hunter: a novel web shell detection systembased on scoring scheme () Share TD Tu, C Guang, G Xiaojun, P Wubin | | |
Detecting DGA-Based Botnet with DNS Traffic Analysis in Monitored Network DT Truong123, G Cheng12, A Jakalan12, X Guo12, A Zhou12 | | |