Skip to main content

Showing 1–9 of 9 results for author: Dang, T K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.08843  [pdf, other

    cs.AI

    Fuzzy Fault Trees Formalized

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Fault tree analysis is a vital method of assessing safety risks. It helps to identify potential causes of accidents, assess their likelihood and severity, and suggest preventive measures. Quantitative analysis of fault trees is often done via the dependability metrics that compute the system's failure behaviour over time. However, the lack of precise data is a major obstacle to quantitative analys… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: 14 pages

  2. arXiv:2401.12346  [pdf, other

    cs.CR

    Fuzzy quantitative attack tree analysis

    Authors: Thi Kim Nhung Dang, Milan Lopuhaä-Zwakenberg, Mariëlle Stoelinga

    Abstract: Attack trees are important for security, as they help to identify weaknesses and vulnerabilities in a system. Quantitative attack tree analysis supports a number security metrics, which formulate important KPIs such as the shortest, most likely and cheapest attacks. A key bottleneck in quantitative analysis is that the values are usually not known exactly, due to insufficient data and/or lack of… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 23 pages, 6 figures, FASE2024

  3. arXiv:2111.05062  [pdf, other

    cs.LG

    Look back, look around: a systematic analysis of effective predictors for new outlinks in focused Web crawling

    Authors: Thi Kim Nhung Dang, Doina Bucur, Berk Atil, Guillaume Pitel, Frank Ruis, Hamidreza Kadkhodaei, Nelly Litvak

    Abstract: Small and medium enterprises rely on detailed Web analytics to be informed about their market and competition. Focused crawlers meet this demand by crawling and indexing specific parts of the Web. Critically, a focused crawler must quickly find new pages that have not yet been indexed. Since a new page can be discovered only by following a new outlink, predicting new outlinks is very relevant in p… ▽ More

    Submitted 15 November, 2022; v1 submitted 9 November, 2021; originally announced November 2021.

    Comments: 23 pages, 15 figures, 4 tables, uses arxiv.sty, added new title, heuristic features and their results added, figures 7, 14, and 15 updated, accepted version

  4. arXiv:2005.07160  [pdf

    cs.CR

    XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy

    Authors: Tran Khanh Dang, Xuan Son Ha, Luong Khiem Tran

    Abstract: Authorization and access control play an essential role in protecting sensitive information from malicious users. The system is based on security policies to determine if an access request is allowed. However, of late, the growing popularity of big data has created a new challenge which the security policy management is facing with such as dynamic and update policies in run time. Applications of d… ▽ More

    Submitted 10 April, 2020; originally announced May 2020.

    Comments: 12 pages

  5. arXiv:1904.04710  [pdf

    cs.CR

    Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor

    Authors: Thi Ai Thao Nguyen, Tran Khanh Dang, Quynh Chi Truong, Dinh Thanh Nguyen

    Abstract: In this paper, we have proposed a multi factor biometric-based remote authentication protocol. Our proposal overcomes the vulnerabilities of some previous works. At the same time, the protocol also obtains a low false accept rate (FAR) and false reject rate (FRR).

    Submitted 9 April, 2019; originally announced April 2019.

    Comments: RCCIE17

  6. arXiv:1904.03320  [pdf

    cs.CR

    A Visual Model for Web Applications Security Monitoring

    Authors: Tran Tri Dang, Tran Khanh Dang

    Abstract: This paper proposes a novel visual model for web applications security monitoring. Although an automated intrusion detection system can shield a web application from common attacks, it usually cannot detect more complicated break-ins. So, a human-assisted monitoring system is an indispensable complement, following the "Defense in depth" strategy. To support human operators working more effectively… ▽ More

    Submitted 5 April, 2019; originally announced April 2019.

    Comments: ISIC2011 (Best paper award)

  7. arXiv:1904.00264  [pdf

    cs.CR

    A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment

    Authors: Thi Ai Thao Nguyen, Tran Khanh Dang, Dinh Thanh Nguyen

    Abstract: Biometric template protection is one of most essential parts in putting a biometric-based authentication system into practice. There have been many researches proposing different solutions to secure biometric templates of users. They can be categorized into two approaches: feature transformation and biometric cryptosystem. However, no one single template protection approach can satisfy all the req… ▽ More

    Submitted 30 March, 2019; originally announced April 2019.

    Comments: 11 pages, 6 figures, accepted for IMCOM 2019

  8. arXiv:1903.10018  [pdf

    cs.CR

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Authors: Tran Khanh Dang, Khanh T. K. Tran

    Abstract: Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous… ▽ More

    Submitted 24 March, 2019; originally announced March 2019.

    Comments: 27 pages

    Journal ref: Security and Communication Networks (SCN), Hindawi, 2019

  9. arXiv:0912.2289  [pdf

    cs.NI cs.CR cs.HC

    Security Visualization for peer-to-peer resource sharing applications

    Authors: Dand Tran Tri, Tran Khanh Dang

    Abstract: Security of an information system is only as strong as its weakest element. Popular elements of such system include hardware, software, network and people. Current approaches to computer security problems usually exclude people in their studies even though it is an integral part of these systems. To fill that gap, this paper discusses crucial people-related problems in computer security and prop… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

    Journal ref: IJCSE Volume 1 Issue 2 2009 47-55