default search action
Cam Nguyen Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Nguyen Tan Cam, Tran Duc Viet:
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. Clust. Comput. 28(1): 11 (2025) - 2024
- [j7]Nguyen Tan Cam, Nguyen Ngoc Man:
Uit-DGAdetector: detect domains generated by algorithms using machine learning. Clust. Comput. 27(6): 7599-7619 (2024) - [j6]Qui Ngoc Nguyen, Nguyen Tan Cam, Kiet Van Nguyen:
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models. Comput. Secur. 140: 103814 (2024) - [j5]Doan Minh Trung, Nghi Hoang Khoa, Phan The Duy, Van-Hau Pham, Nguyen Tan Cam:
AAGAN: Android Malware Generation System Based on Generative Adversarial Network. Vietnam. J. Comput. Sci. 11(2): 275-299 (2024) - [c19]Nguyen Vuong Thinh, Nguyen Tan Cam, Trinh Gia Huy:
uitPEclaFL: A Study on PE Malware Classification Using Federated Learning. JCSSE 2024: 670-677 - [c18]Pham Thai Bao, Do Thi Thu Hien, Nguyen Tan Cam, Van-Hau Pham:
A multimodal Windows malware detection method based on hybrid analysis and graph representations. MAPR 2024: 1-6 - 2023
- [j4]Nguyen Tan Cam, Nguyen Gia Trung:
An Intelligent Approach to Improving the Performance of Threat Detection in IoT. IEEE Access 11: 44319-44334 (2023) - [j3]Nguyen Tan Cam, Vu Tuan Kiet:
FlwrBC: Incentive Mechanism Design for Federated Learning by Using Blockchain. IEEE Access 11: 107855-107866 (2023) - [c17]Cong-Danh Nguyen, Nghi Hoang Khoa, Khoa Nguyen-Dang Doan, Nguyen Tan Cam:
Android Malware Category and Family Classification Using Static Analysis. ICOIN 2023: 162-167 - [c16]Doan Minh Trung, Nghi Hoang Khoa, Bui Tan Hai Dang, Phan The Duy, Nguyen Tan Cam, Van-Hau Pham:
On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors. MAPR 2023: 1-6 - 2022
- [c15]Nguyen Tan Cam, Nguyen Van Nhinh, Tran Huyen Trang:
Fall Detection System Based on Pose Estimation in Videos. ICO 2022: 162-172 - [c14]Nguyen Tan Cam, Pham Nhat Duy, Vo Ngoc Tan, Nguyen Vuong Thinh, Nguyen Chi Duc, Nguyen Quoc Bao:
Inter-application Communications Using Covert Channels in Android Applications. ICO 2022: 200-209 - [c13]Nguyen Tan Cam, Pham Nhat Duy, Nghi Hoang Khoa, Le Hoang Vien, Phan Thanh Truoc, Trinh Gia Huy:
UIT-ADF: A System for Android Device Forensics. ICO 2022: 290-299 - [c12]Vuong Thi Thanh Nhan, Tran Phuoc, Nguyen Ngoc Khanh Dung, Nguyen Tan Cam:
A Study on Accounting Information System Security. ICO 2022: 320-329 - [c11]Pham Ri Nep, Nguyen Tan Cam:
A Research on Countering Virtual Machine Evasion Techniques of Malware in Dynamic Analysis. ICO 2022: 585-596 - [c10]Nguyen Tan Cam, To Ung Vu, Nghi Hoang Khoa, Van-Hau Pham:
uitXkernel: Android Kernel Forensic for Security Analysis Purposes. ICO 2022: 1148-1158 - 2021
- [c9]Nghi Hoang Khoa, Nguyen Tan Cam, Van-Hau Pham, Anh Gia-Tuan Nguyen:
Detect Android malware by using deep learning: Experiment and Evaluation. ICMLSC 2021: 129-134
2010 – 2019
- 2019
- [j2]Nguyen Tan Cam, Van-Hau Pham, Tuan A. Nguyen:
Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique. Clust. Comput. 22(Suppl 1): 1055-1064 (2019) - [j1]Ly Hoang Tuan, Nguyen Tan Cam, Van-Hau Pham:
Enhancing the accuracy of static analysis for detecting sensitive data leakage in Android by using dynamic analysis. Clust. Comput. 22(Suppl 1): 1079-1085 (2019) - [c8]Nguyen Tan Cam, Nghi Hoang Khoa, Le Duc Thinh, Van-Hau Pham, Tuan A. Nguyen:
Proposing Automatic Dataset Generation System to Support Android Sensitive Data Leakage Detection Systems. ICCAI 2019: 78-83 - [c7]Nguyen Tan Cam, Toan Nguyen, Khanh Nguyen, Tuan A. Nguyen, Van-Hau Pham:
Detect Malware in Android Firmware Based on Distributed Network Environment. ICCT 2019: 1566-1570 - 2017
- [c6]Hoang Tuan Ly, Cam Nguyen Tan, Van-Hau Pham:
eDSDroid: A Hybrid Approach for Information Leak Detection in Android. ICISA 2017: 290-297 - [c5]Nguyen Tan Cam, Van-Hau Pham, Tuan A. Nguyen:
Detect Sensitive Data Leakage via Inter-application on Android by Using Static Analysis and Dynamic Analysis. ICISA 2017: 298-305 - [c4]Nguyen Tan Cam, Van-Hau Pham, Tuan A. Nguyen:
Sensitive Data Leakage Detection in Pre-Installed Applications of Custom Android Firmware. MDM 2017: 340-343 - 2014
- [c3]Nguyen Van Nhuong, Vo Thi Yen Nhi, Cam Nguyen Tan, Phu Xuan Mai, Tan Cao Dang:
SSSM-semantic set and string matching based malware detection. CISDA 2014: 1-6 - [c2]Nguyen Van Nhuong, Vo Thi Yen Nhi, Nguyen Tan Cam, Phu Xuan Mai, Cao Dang Tan:
Semantic Set Analysis for Malware Detection. CISIM 2014: 688-700
2000 – 2009
- 2009
- [c1]Cam Nguyen Tan, Son Dang Truong, Tan Cao Dang:
Early Abnormal Overload Detection and the Solution on Content Delivery Network. SCSS 2009: 455-460
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint