Thuy D. Nguyen

According to our database1, Thuy D. Nguyen authored at least 33 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ODSS: A Ghidra-based Static Analysis Tool for Detecting Stack-Based Buffer Overflows.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Hardening Honeypots for Industrial Control Systems.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Creating Synthetic Attacks with Evolutionary Algorithms for Proactive Defense of Industrial Control Systems.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Classifying RDP Remote Attacks on User Interfaces to Industrial Control Systems.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

Analyzing Attacks on Client-Side Honeypots from Representative Malicious Web Sites.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Identifying Anomalous Industrial-Control-System Network Flow Activity Using Cloud Honeypots.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

2020
Creating Convincing Industrial-Control-System Honeypots.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
A Strategy for Security Testing Industrial Firewalls.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

2017
DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing.
Proceedings of the 3rd Annual Industrial Control System Security Workshop, 2017

2015
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Teaching Industrial Control System Security Using Collaborative Projects.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

2013
Towards a Cross-Domain MapReduce Framework.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2010
Security Primitives for Reconfigurable Hardware-Based Systems.
ACM Trans. Reconfigurable Technol. Syst., 2010

Educating the Systems Security Engineer's Apprentice.
IEEE Secur. Priv., 2010

2009
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture.
Proceedings of the Trusted Computing, 2009

Idea: Trusted Emergency Management.
Proceedings of the Engineering Secure Software and Systems, 2009

MYSEA: the monterey security architecture.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Managing Security in FPGA-Based Embedded Systems.
IEEE Des. Test Comput., 2008

Trustworthy System Security through 3-D Integrated Hardware.
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

A security architecture for transient trust.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

2007
A video game for cyber security training and awareness.
Comput. Secur., 2007

Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Analysis of three multilevel security architectures.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Toward a Medium-Robustness Separation Kernel Protection Profile.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Utilizing the Common Criteria for Advanced Student Research Projects.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Cyber Security Training and Awareness Through Game Play.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

High Robustness Requirements in a Common Criteria Protection Profile.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Using Common Criteria Methodology to Express Informal Security Requirements.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

Least Privilege in Separation Kernels.
Proceedings of the E-Business and Telecommunication Networks, 2006

A Model for Temporal Interval Authorizations.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
A study of initialization in Linux and OpenBSD.
ACM SIGOPS Oper. Syst. Rev., 2005

TCX project: high assurance for secure embedded systems.
SIGBED Rev., 2005

Foundation for a Time Interval Access Control Model.
Proceedings of the Computer Network Security, 2005


  Loading...