BibTeX records: Huy Anh Nguyen

download as .bib file

@inproceedings{DBLP:conf/sec/HoangCVNN13,
  author    = {Thang Hoang and
               Deokjai Choi and
               Quang Viet Vo and
               Huy Anh Nguyen and
               Thuc Dinh Nguyen},
  title     = {A Lightweight Gait Authentication on Mobile Phone Regardless of Installation
               Error},
  booktitle = {{SEC}},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {405},
  pages     = {83--101},
  publisher = {Springer},
  year      = {2013}
}
@inproceedings{DBLP:conf/mobihoc/ChhetriNSZ10,
  author    = {Arun Chhetri and
               Huy Anh Nguyen and
               Gabriel Scalosub and
               Rong Zheng},
  title     = {On quality of monitoring for multi-channel wireless infrastructure
               networks},
  booktitle = {MobiHoc},
  pages     = {111--120},
  publisher = {{ACM}},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-0528,
  author    = {Huy Anh Nguyen and
               Rong Zheng},
  title     = {Binary Independent Component Analysis with {OR} Mixtures},
  journal   = {CoRR},
  volume    = {abs/1007.0528},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1264,
  author    = {Huy Anh Nguyen and
               Tam Van Nguyen and
               Dong Il Kim and
               Deokjai Choi},
  title     = {Network Traffic Anomalies Detection and Identification with Flow Monitoring},
  journal   = {CoRR},
  volume    = {abs/1007.1264},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1265,
  author    = {Tam Van Nguyen and
               Wontaek Lim and
               Huy Anh Nguyen and
               Deokjai Choi},
  title     = {Context Awareness Framework Based on Contextual Graph},
  journal   = {CoRR},
  volume    = {abs/1007.1265},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1266,
  author    = {Huy Anh Nguyen and
               Deokjai Choi},
  title     = {Network Anomaly Detection: Flow-based or Packet-based Approach?},
  journal   = {CoRR},
  volume    = {abs/1007.1266},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1268,
  author    = {Huy Anh Nguyen and
               Deokjai Choi},
  title     = {Application of Data Mining to Network Intrusion Detection: Classifier
               Selection Model},
  journal   = {CoRR},
  volume    = {abs/1007.1268},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1270,
  author    = {Huy Anh Nguyen and
               Tam Van Nguyen and
               Deokjai Choi},
  title     = {How to Maximize User Satisfaction Degree in Multi-service {IP} Networks},
  journal   = {CoRR},
  volume    = {abs/1007.1270},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1273,
  author    = {Tam Van Nguyen and
               Wontaek Lim and
               Huy Anh Nguyen and
               Deokjai Choi and
               Chilwoo Lee},
  title     = {Context Ontology Implementation for Smart Home},
  journal   = {CoRR},
  volume    = {abs/1007.1273},
  year      = {2010}
}
@article{DBLP:journals/corr/abs-1007-1274,
  author    = {Tam Van Nguyen and
               Huy Anh Nguyen and
               Deokjai Choi},
  title     = {Development of a Context Aware Virtual Smart Home Simulator},
  journal   = {CoRR},
  volume    = {abs/1007.1274},
  year      = {2010}
}
@inproceedings{DBLP:conf/aciids/NguyenNC09,
  author    = {Huy Anh Nguyen and
               Tam Van Nguyen and
               Deokjai Choi},
  title     = {How to Maximize User Satisfaction Degree in Multi-service {IP} Networks},
  booktitle = {{ACIIDS}},
  pages     = {471--476},
  publisher = {{IEEE} Computer Society},
  year      = {2009}
}
@inproceedings{DBLP:conf/apnoms/NguyenC08,
  author    = {Huy Anh Nguyen and
               Deokjai Choi},
  title     = {Application of Data Mining to Network Intrusion Detection: Classifier
               Selection Model},
  booktitle = {{APNOMS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {5297},
  pages     = {399--408},
  publisher = {Springer},
  year      = {2008}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics