default search action
Duy Cu Nguyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Qiang Tang, Orhan Ermis, Cu D. Nguyen, Alexandre De Oliveira, Alain Hirtzig:
A Systematic Analysis of 5G Networks With a Focus on 5G Core Security. IEEE Access 10: 18298-18319 (2022) - [j5]Ha Thanh Le, Lwin Khin Shar, Domenico Bianculli, Lionel Claude Briand, Cu Duy Nguyen:
Automated reverse engineering of role-based access control policies of web applications. J. Syst. Softw. 184: 111109 (2022) - [c36]Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre De Oliveira, Cu D. Nguyen, Alain Hirtzig:
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks. ISPEC 2022: 345-363
2010 – 2019
- 2019
- [c35]Georgios Kaiafas, Christian A. Hammerschmidt, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:
An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles. IM 2019: 37-42 - 2018
- [j4]Dennis Appelt, Cu D. Nguyen, Annibale Panichella, Lionel C. Briand:
A Machine-Learning-Driven Evolutionary Approach for Testing Web Application Firewalls. IEEE Trans. Reliab. 67(3): 733-757 (2018) - [c34]Georgios Kaiafas, Georgios Varisteas, Sofiane Lagraa, Radu State, Cu D. Nguyen, Thorsten Ries, Mohamed Ourdane:
Detecting malicious authentication events trustfully. NOMS 2018: 1-6 - 2017
- [c33]Sadeeq Jan, Cu D. Nguyen, Andrea Arcuri, Lionel C. Briand:
A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications. ICST 2017: 356-366 - 2016
- [c32]Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Automated and effective testing of web services for XML injection attacks. ISSTA 2016: 12-23 - [c31]Mariano Ceccato, Cu D. Nguyen, Dennis Appelt, Lionel C. Briand:
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities. ASE 2016: 167-177 - 2015
- [j3]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency. ACM Trans. Softw. Eng. Methodol. 25(1): 5:1-5:38 (2015) - [c30]Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand:
Behind an Application Firewall, Are We Safe from SQL Injection Attacks? ICST 2015: 1-10 - [c29]Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. QRS 2015: 233-241 - [c28]Ha-Thanh Le, Cu Duy Nguyen, Lionel C. Briand, Benjamin Hourte:
Automated Inference of Access Control Policies for Web Applications. SACMAT 2015: 27-37 - 2014
- [c27]Paolo Tonella, Roberto Tiella, Duy Cu Nguyen:
Interpolated n-grams for model based testing. ICSE 2014: 562-572 - [c26]Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand, Nadia Alshahwan:
Automated testing for SQL injection vulnerabilities: an input mutation approach. ISSTA 2014: 259-269 - [p1]Mirko Morandini, Fabiano Dalpiaz, Cu Duy Nguyen, Alberto Siena:
The Tropos Software Engineering Methodology. Handbook on Agent-Oriented Design Processes 2014: 463-490 - 2013
- [c25]Cu D. Nguyen, Bilha Mendelson, Daniel Citron, Onn Shehory, Tanja E. J. Vos, Nelly Condori-Fernández:
Evaluating the FITTEST Automated Testing Tools: An Industrial Case Study. ESEM 2013: 332-339 - [c24]Paolo Tonella, Cu Duy Nguyen, Alessandro Marchetto, Kiran Lakhotia, Mark Harman:
Automated generation of state abstraction functions using data invariant inference. AST 2013: 75-81 - [c23]Duy Cu Nguyen, Paolo Tonella:
Automated inference of classifications and dependencies for combinatorial testing. ASE 2013: 622-627 - [c22]Paolo Tonella, Roberto Tiella, Cu D. Nguyen:
N-Gram Based Test Sequence Generation from Finite State Models. FITTEST@ICTSS 2013: 59-74 - [c21]Cu D. Nguyen, Alessandro Marchetto, Paolo Tonella:
Automated oracles: an empirical study on cost and effectiveness. ESEC/SIGSOFT FSE 2013: 136-146 - 2012
- [j2]Cu D. Nguyen, Simon Miles, Anna Perini, Paolo Tonella, Mark Harman, Michael Luck:
Evolutionary testing of autonomous software agents. Auton. Agents Multi Agent Syst. 25(2): 260-283 (2012) - [c20]Mariano Ceccato, Alessandro Marchetto, Leonardo Mariani, Cu D. Nguyen, Paolo Tonella:
An empirical study about the effectiveness of debugging when random test cases are used. ICSE 2012: 452-462 - [c19]Paolo Tonella, Alessandro Marchetto, Duy Cu Nguyen, Yue Jia, Kiran Lakhotia, Mark Harman:
Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs. ICST 2012: 21-30 - [c18]Leonardo Mariani, Alessandro Marchetto, Cu D. Nguyen, Paolo Tonella, Arthur I. Baars:
Revolution: Automatic Evolution of Mined Specifications. ISSRE 2012: 241-250 - [c17]Cu D. Nguyen, Alessandro Marchetto, Paolo Tonella:
Combining model-based and combinatorial testing for effective test case generation. ISSTA 2012: 100-110 - 2011
- [c16]Duy Cu Nguyen, Alessandro Marchetto, Paolo Tonella:
Challenges in Audit Testing of Web Services. ICST Workshops 2011: 103-106 - [c15]Alessandro Marchetto, Duy Cu Nguyen, Paolo Tonella:
Automated Detection of Discontinuities in Models Inferred from Execution Traces. ICST Workshops 2011: 286-293 - [c14]Duy Cu Nguyen, Alessandro Marchetto, Paolo Tonella:
Change Sensitivity Based Prioritization for Audit Testing of Webservice Compositions. ICST Workshops 2011: 357-365 - [c13]Cu D. Nguyen, Alessandro Marchetto, Paolo Tonella:
Test Case Prioritization for Audit Testing of Evolving Web Services Using Information Retrieval Techniques. ICWS 2011: 636-643 - [c12]Mirko Morandini, Duy Cu Nguyen, Loris Penserini, Anna Perini, Angelo Susi:
Tropos Modeling, Code Generation and Testing with the Taom4E Tool. iStar 2011: 172-174 - 2010
- [j1]Cu D. Nguyen, Anna Perini, Paolo Tonella:
Goal-oriented testing for MASs. Int. J. Agent Oriented Softw. Eng. 4(1): 79-109 (2010) - [c11]Nauman A. Qureshi, Cu D. Nguyen, Anna Perini:
Analyzing Interoperability Requirements for Adaptive Service-Based Applications: A Goal-Oriented Approach. COMPSAC Workshops 2010: 239-244 - [c10]Alessandro Marchetto, Cu D. Nguyen, Chiara Di Francescomarino, Nauman A. Qureshi, Anna Perini, Paolo Tonella:
A design methodology for real services. PESOS 2010: 15-21 - [c9]Chiara Di Francescomarino, Chiara Leonardi, Alessandro Marchetto, Cu D. Nguyen, Nauman A. Qureshi, Luca Sabatucci, Anna Perini, Angelo Susi, Paolo Tonella, Massimo Zancanaro:
A bit of "Persona", a bit of "Goal", a bit of "Process" ... a recipe for Analyzing User Intensive Software Systems. iStar 2010: 36-40
2000 – 2009
- 2009
- [b1]Duy Cu Nguyen:
Testing Techniques for Software Agents. University of Trento, Italy, 2009 - [c8]Cu D. Nguyen, Anna Perini, Carole Bernon, Juan Pavón, John Thangarajah:
Testing in Multi-Agent Systems. AOSE 2009: 180-190 - [c7]Cu D. Nguyen, Anna Perini, Paolo Tonella, Simon Miles, Mark Harman, Michael Luck:
Evolutionary testing of autonomous software agents. AAMAS (1) 2009: 521-528 - 2008
- [c6]Cu D. Nguyen, Anna Perini, Paolo Tonella:
Experimental Evaluation of Ontology-Based Test Generation for Multi-agent Systems. AOSE 2008: 187-198 - [c5]Duy Cu Nguyen, Anna Perini, Paolo Tonella:
Ontology-based test generation for multiagent systems. AAMAS (3) 2008: 1315-1320 - [c4]Duy Cu Nguyen, Anna Perini, Paolo Tonella:
eCAT: a tool for automating test cases generation and execution in testing multi-agent systems. AAMAS (Demos) 2008: 1669-1670 - [c3]Cu D. Nguyen, Anna Perini, Paolo Tonella:
Constraint-based Evolutionary Testing of Autonomous Distributed Systems. ICST Workshops 2008: 221-230 - 2007
- [c2]Duy Cu Nguyen, Anna Perini, Paolo Tonella:
A Goal-Oriented Software Testing Methodology. AOSE 2007: 58-72 - [c1]Mirko Morandini, Duy Cu Nguyen, Anna Perini, Alberto Siena, Angelo Susi:
Tool-Supported Development with Tropos: The Conference Management System Case Study. AOSE 2007: 182-196
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint