Follow
Phu H. Phung
Phu H. Phung
Associate Professor of Computer Science at University of Dayton
Verified email at udayton.edu - Homepage
Title
Cited by
Cited by
Year
Lightweight self-protecting JavaScript
PH Phung, D Sands, A Chudnov
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1972009
JSand: Complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
1422012
Vehicle ECU classification based on safety-security characteristics
DK Nilsson, PH Phung, UE Larson
Road Transport Information and Control-RTIC 2008 and ITS United Kingdom …, 2008
1032008
HIT4Mal: Hybrid image transformation for malware classification
DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung
Transactions on Emerning Telecommunications Technologies, 2020
962020
Safe wrappers and sane policies for self protecting JavaScript
J Magazinius, PH Phung, D Sands
Nordic Conference on Secure IT Systems, 239-255, 2010
892010
A convolutional transformation network for malware classification
DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 234-239, 2019
722019
MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web
PN Hiremath, J Armentrout, S Vu, TN Nguyen, QT Minh, PH Phung
FDSE 2019: Future Data and Security Engineering 11814 (Lecture Notes in …, 2019
452019
Security policy enforcement in the OSGi framework using aspect-oriented programming
PH Phung, D Sands
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
322008
An airfare prediction model for developing markets
VH Vu, QT Minh, PH Phung
2018 International Conference on Information Networking (ICOIN), 765-770, 2018
312018
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-party Web Content
P Phung, M Monshizadeh, M Sridhar, K Hamlen, V Venkatakrishnan
IEEE Transactions of Dependable and Secure Computing 12 (4), 443-457, 2015
312015
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning.
I Obaidata, M Sridhar, KM Pham, PH Phung
Computers & Security, 2021
292021
HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications
PH Phung, A Mohanty, R Rachapalli, M Sridhar
Mobile Security Technologies (MoST), 147-156, 2017
272017
A two-tier sandbox architecture for untrusted JavaScript
PH Phung, L Desmet
Proceedings of the Workshop on JavaScript Tools, 1-10, 2012
192012
SAFESCRIPT: JavaScript Transformation for Policy Enforcement
M Ter Louw, PH Phung, R Krishnamurti, VN Venkatakrishnan
Secure IT Systems, 67-83, 2013
172013
A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring
D Nguyen, PH Phung
2017 International Conference on Intelligent Environments (IE), 84-91, 2017
162017
Toward An IoT-based Expert System for Heart Disease Diagnosis
DT Thai, QT Minh, PH Phung
The 28th Modern Artificial Intelligence and Cognitive Science Conference …, 2017
162017
P4SINC–An Execution Policy Framework for IoT Services in the Edge
PH Phung, HL Truong, DT Yasoju
International Congress on Internet of Things (ICIOT), 137-142, 2017
162017
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge
PH Nguyen, PH Phung, HL Truong
Proceedings of the 8th International Conference on the Internet of Things, 4, 2018
152018
From verification to optimizations
R Gjomemo, KS Namjoshi, PH Phung, VN Venkatakrishnan, LD Zuck
Verification, Model Checking, and Abstract Interpretation, 300-317, 2015
142015
Securing AODV routing protocol in mobile ad-hoc networks
P Phu, M Yi, MK Kim
Active and Programmable Networks, 182-187, 2009
142009
The system can't perform the operation now. Try again later.
Articles 1–20