Hoang Viet Long

ORCID: 0000-0001-9883-9506
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Recommender Systems and Techniques
  • Image Retrieval and Classification Techniques
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Energy Efficient Wireless Sensor Networks
  • Digital Marketing and Social Media
  • Video Analysis and Summarization
  • COVID-19 epidemiological studies
  • Remote-Sensing Image Classification
  • Security in Wireless Sensor Networks
  • Web Application Security Vulnerabilities
  • Carbon and Quantum Dots Applications
  • Data Stream Mining Techniques
  • Advanced Image and Video Retrieval Techniques
  • Image and Video Quality Assessment
  • Security and Verification in Computing
  • Consumer Market Behavior and Pricing
  • Sparse and Compressive Sensing Techniques
  • Network Packet Processing and Optimization
  • Covalent Organic Framework Applications
  • Frequency Control in Power Systems

Ton Duc Thang University
2020-2024

University Of Transport Technology
2023

Information Technology University
2021

Maharaja Engineering College
2021

Montimage (France)
2018-2019

Université de Technologie de Troyes
2016

Centre National de la Recherche Scientifique
2016

University of Transport and Communications
2013

Recommendation System (RS) has been broadly utilized in various areas and discovers product recommendations during an active user interaction E-Commerce sites. Tremendous growth of users products recent years faced some key challenges. There are numerous online sites that present many decisions to the at once, which is strenuous. Moreover, finding or right important task RS. Existing works have proposed recommend a by considering inclination socio-demographic behaviour. In this paper, we...

10.1109/access.2020.2994056 article EN cc-by IEEE Access 2020-01-01

A recommender system (RS) delivers personalized suggestions on products based the interest of a particular user. Content-based filtering (CBF) and collaborative (CF) schemes have been previously used for this task. However, main challenge in RS is cold start problem (CSP). This originates once new user joins which makes recommendation task tedious due to shortage information (clickstream, dwell time, rating, etc.) regarding user’s interest. Therefore, CBF CF are combined together by...

10.3233/jifs-200595 article EN Journal of Intelligent & Fuzzy Systems 2020-07-31

In Botnet Detection, Domain generation algorithms are the most effective method to intercept and analyze captured package. this article, we propose a new classify harmful domain names using Neutrosophic Sets. Data of name, after being selected featured fuzzed into Neutrosoph ic Sets will be used benign names, malicious indeterminacy minimizing false detection names. The proposed model is going tested evaluated with other models in aspects accuracy points, Accuracy, Revocation, F1, all which...

10.3233/jifs-190681 article EN Journal of Intelligent & Fuzzy Systems 2020-04-24

Named Data Networking (NDN) is the most mature proposal of Information Centric paradigm, a clean-slate approach for Future Internet. Although NDN was designed to tackle security issues inherent IP networks natively, newly introduced attacks in its transitional phase threaten NDN's practical deployment. Therefore, monitoring plane indispensable before any potential deployment this novel architecture an operating context by provider. We propose and anomaly detection nodes leveraging Bayesian...

10.1109/noms.2018.8406246 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2018-04-01

The orchestration of counter-measures in the context security incidents remains a challenging task for network operators. main objective this demonstration is to present how possible virtualized NDN network. Based on an adaptation TOSCA topology and model, it trigger these counter- measures after detection specific attacks. We show Montimage Monitoring Tool (MMT) has been adapted detect typical Content Poisoning Attack (CPA), orchestrator can reactions mitigate their impact

10.1109/icin.2018.8401591 preprint EN 2018-02-01

This paper proposes adaptive fuzzy lead-lag controller structures for power system stabilizer and flexible AC transmission based damping controllers to increase the stability of system. The parameters proposed are tuned by a modified grasshopper optimization algorithm (MGOA). new named MGOA accomplishes proper balance between exploration exploitation phases original algorithm. capability is certified using benchmark functions comparing with that algorithm, genetic evolutionary strategies,...

10.3233/jifs-212716 article EN Journal of Intelligent & Fuzzy Systems 2022-05-24

Abstract— Malware in general and botnets particular are big threats to cybersecurity. They have many sophisticated methods bypass security systems infect computers perform attacks, sabotage, or spying activities. Botnet detection solutions always focused on solved by scientists cybersecurity specialists. The DGA botnet is a group of common families that share the same mechanism needing connect back C&C server via DNS receive commands operate. Many studies propose algorithms for detecting...

10.54654/isj.v3i17.894 article EN cc-by Journal of Science and Technology on Information security 2023-04-01

Data acquisition problem on large distributed wireless sensor networks (WSNs) is considered as a challenge in the growth of Internet Things (IoT). Recently, combination compressive sensing (CS) and routing techniques has attracted much attention researchers. An open question this how to integrate these effectively for specific tasks. On other hand, CS data reconstruction process one challenges because it requires recover N from only M measurement where M< <N. Through paper, we propose...

10.3233/jifs-190862 article EN Journal of Intelligent & Fuzzy Systems 2021-06-18

Web applications are progressively developing and applied in most aspects of life. However, there exist a variety dangerous website security vulnerabilities such as SQL injection cross-site scripting. This creates the opportunity for hackers to exploit attack websites commercial or political purposes fame. Some research software have been developed scanning detecting those vulnerabilities. In this paper, we present an efficient algorithmic study tool detect web Experimental results show that...

10.1504/ijwgs.2020.106128 article EN International Journal of Web and Grid Services 2020-01-01
Coming Soon ...