Phu H. Phung
Phu H. Phung
Associate Professor of Computer Science at University of Dayton
Verified email at - Homepage
Cited by
Cited by
Lightweight self-protecting JavaScript
PH Phung, D Sands, A Chudnov
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
JSand: Complete client-side sandboxing of third-party JavaScript without browser modifications
P Agten, S Van Acker, Y Brondsema, PH Phung, L Desmet, F Piessens
Proceedings of the 28th Annual Computer Security Applications Conference, 1-10, 2012
Safe wrappers and sane policies for self protecting JavaScript
J Magazinius, PH Phung, D Sands
Nordic Conference on Secure IT Systems, 239-255, 2010
Vehicle ECU classification based on safety-security characteristics
DK Nilsson, PH Phung, UE Larson
Road Transport Information and Control-RTIC 2008 and ITS United Kingdom …, 2008
HIT4Mal: Hybrid image transformation for malware classification
DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung
Transactions on Emerning Telecommunications Technologies, 2020
A convolutional transformation network for malware classification
DL Vu, TK Nguyen, TV Nguyen, TN Nguyen, F Massacci, PH Phung
2019 6th NAFOSTED Conference on Information and Computer Science (NICS), 234-239, 2019
MyWebGuard: Toward a User-Oriented Tool for Security and Privacy Protection on the Web
PN Hiremath, J Armentrout, S Vu, TN Nguyen, QT Minh, PH Phung
FDSE 2019: Future Data and Security Engineering 11814 (Lecture Notes in …, 2019
Security policy enforcement in the OSGi framework using aspect-oriented programming
PH Phung, D Sands
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-party Web Content
P Phung, M Monshizadeh, M Sridhar, K Hamlen, V Venkatakrishnan
IEEE Transactions of Dependable and Secure Computing 12 (4), 443-457, 2015
HybridGuard: A Principal-based Permission and Fine-Grained Policy Enforcement Framework for Web-based Mobile Applications
PH Phung, A Mohanty, R Rachapalli, M Sridhar
Mobile Security Technologies (MoST), 147-156, 2017
A two-tier sandbox architecture for untrusted JavaScript
PH Phung, L Desmet
Proceedings of the Workshop on JavaScript Tools, 1-10, 2012
An airfare prediction model for developing markets
VH Vu, QT Minh, PH Phung
2018 International Conference on Information Networking (ICOIN), 765-770, 2018
P4SINC–An Execution Policy Framework for IoT Services in the Edge
PH Phung, HL Truong, DT Yasoju
International Congress on Internet of Things (ICIOT), 137-142, 2017
SAFESCRIPT: JavaScript Transformation for Policy Enforcement
M Ter Louw, PH Phung, R Krishnamurti, VN Venkatakrishnan
Secure IT Systems, 67-83, 2013
Securing AODV routing protocol in mobile ad-hoc networks
P Phu, M Yi, MK Kim
Active and Programmable Networks, 182-187, 2009
From verification to optimizations
R Gjomemo, KS Namjoshi, PH Phung, VN Venkatakrishnan, LD Zuck
Verification, Model Checking, and Abstract Interpretation, 300-317, 2015
A service management framework for SOA-based interoperability transactions
PH Phu, M Yi
Proceedings. The 9th Russian-Korean International Symposium on Science and …, 2005
A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring
D Nguyen, PH Phung
2017 International Conference on Intelligent Environments (IE), 84-91, 2017
A Security Policy Enforcement Framework for Controlling IoT Tenant Applications in the Edge
PH Nguyen, PH Phung, HL Truong
Proceedings of the 8th International Conference on the Internet of Things, 4, 2018
A model for safe and secure execution of downloaded vehicle applications
PH Phung, DK Nilsson
Road Transport Information and Control Conference and the ITS United Kingdom …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20