- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Recommender Systems and Techniques
- Image Retrieval and Classification Techniques
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Spam and Phishing Detection
- Energy Efficient Wireless Sensor Networks
- Digital Marketing and Social Media
- Video Analysis and Summarization
- COVID-19 epidemiological studies
- Remote-Sensing Image Classification
- Security in Wireless Sensor Networks
- Web Application Security Vulnerabilities
- Carbon and Quantum Dots Applications
- Data Stream Mining Techniques
- Advanced Image and Video Retrieval Techniques
- Image and Video Quality Assessment
- Security and Verification in Computing
- Consumer Market Behavior and Pricing
- Sparse and Compressive Sensing Techniques
- Network Packet Processing and Optimization
- Covalent Organic Framework Applications
- Frequency Control in Power Systems
Ton Duc Thang University
2020-2024
University Of Transport Technology
2023
Information Technology University
2021
Maharaja Engineering College
2021
Montimage (France)
2018-2019
Université de Technologie de Troyes
2016
Centre National de la Recherche Scientifique
2016
University of Transport and Communications
2013
Recommendation System (RS) has been broadly utilized in various areas and discovers product recommendations during an active user interaction E-Commerce sites. Tremendous growth of users products recent years faced some key challenges. There are numerous online sites that present many decisions to the at once, which is strenuous. Moreover, finding or right important task RS. Existing works have proposed recommend a by considering inclination socio-demographic behaviour. In this paper, we...
A recommender system (RS) delivers personalized suggestions on products based the interest of a particular user. Content-based filtering (CBF) and collaborative (CF) schemes have been previously used for this task. However, main challenge in RS is cold start problem (CSP). This originates once new user joins which makes recommendation task tedious due to shortage information (clickstream, dwell time, rating, etc.) regarding user’s interest. Therefore, CBF CF are combined together by...
In Botnet Detection, Domain generation algorithms are the most effective method to intercept and analyze captured package. this article, we propose a new classify harmful domain names using Neutrosophic Sets. Data of name, after being selected featured fuzzed into Neutrosoph ic Sets will be used benign names, malicious indeterminacy minimizing false detection names. The proposed model is going tested evaluated with other models in aspects accuracy points, Accuracy, Revocation, F1, all which...
Named Data Networking (NDN) is the most mature proposal of Information Centric paradigm, a clean-slate approach for Future Internet. Although NDN was designed to tackle security issues inherent IP networks natively, newly introduced attacks in its transitional phase threaten NDN's practical deployment. Therefore, monitoring plane indispensable before any potential deployment this novel architecture an operating context by provider. We propose and anomaly detection nodes leveraging Bayesian...
The orchestration of counter-measures in the context security incidents remains a challenging task for network operators. main objective this demonstration is to present how possible virtualized NDN network. Based on an adaptation TOSCA topology and model, it trigger these counter- measures after detection specific attacks. We show Montimage Monitoring Tool (MMT) has been adapted detect typical Content Poisoning Attack (CPA), orchestrator can reactions mitigate their impact
This paper proposes adaptive fuzzy lead-lag controller structures for power system stabilizer and flexible AC transmission based damping controllers to increase the stability of system. The parameters proposed are tuned by a modified grasshopper optimization algorithm (MGOA). new named MGOA accomplishes proper balance between exploration exploitation phases original algorithm. capability is certified using benchmark functions comparing with that algorithm, genetic evolutionary strategies,...
Abstract— Malware in general and botnets particular are big threats to cybersecurity. They have many sophisticated methods bypass security systems infect computers perform attacks, sabotage, or spying activities. Botnet detection solutions always focused on solved by scientists cybersecurity specialists. The DGA botnet is a group of common families that share the same mechanism needing connect back C&C server via DNS receive commands operate. Many studies propose algorithms for detecting...
Data acquisition problem on large distributed wireless sensor networks (WSNs) is considered as a challenge in the growth of Internet Things (IoT). Recently, combination compressive sensing (CS) and routing techniques has attracted much attention researchers. An open question this how to integrate these effectively for specific tasks. On other hand, CS data reconstruction process one challenges because it requires recover N from only M measurement where M< <N. Through paper, we propose...
Web applications are progressively developing and applied in most aspects of life. However, there exist a variety dangerous website security vulnerabilities such as SQL injection cross-site scripting. This creates the opportunity for hackers to exploit attack websites commercial or political purposes fame. Some research software have been developed scanning detecting those vulnerabilities. In this paper, we present an efficient algorithmic study tool detect web Experimental results show that...