Xuan Dau Hoang

Orcid: 0000-0002-2566-7704

According to our database1, Xuan Dau Hoang authored at least 16 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detecting Malware Based on Statistics and Machine Learning Using Opcode N-Grams.
Proceedings of the International Conference on Computing and Communication Technologies, 2023

A CNN-Based Model for Detecting Malicious URLs.
Proceedings of the International Conference on Computing and Communication Technologies, 2023

2022
An improved model for detecting DGA botnets using random forest algorithm.
Inf. Secur. J. A Glob. Perspect., 2022

A Novel Model Based on Ensemble Learning for Detecting DGA Botnets.
Proceedings of the 14th International Conference on Knowledge and Systems Engineering, 2022

2021
A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic.
J. Intell. Fuzzy Syst., 2021

2019
Detecting Website Defacements Based on Machine Learning Techniques and Attack Signatures.
Comput., 2019

A Multi-layer Model for Website Defacement Detection.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

2018
Botnet Detection Based On Machine Learning Techniques Using DNS Query Data.
Future Internet, 2018

A Website Defacement Detection Method Based on Machine Learning Techniques.
Proceedings of the Ninth International Symposium on Information and Communication Technology, 2018

2016
A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection.
Future Internet, 2016

2014
A crossed-domain sentiment analysis system for the discovery of current careers from social networks.
Proceedings of the Fifth Symposium on Information and Communication Technology, 2014

2011
An embedded DSP hardware encryption module for secure e-commerce transactions.
Secur. Commun. Networks, 2011

2009
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference.
J. Netw. Comput. Appl., 2009

2004
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls.
Proceedings of the 12th IEEE International Conference on Networks, 2004

2003
A multi-layer model for anomaly intrusion detection using program sequences of system calls.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Intrusion Detection Based on Data Mining.
Proceedings of the ICEIS 2003, 2003


  Loading...