Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication H Siadati, T Nguyen, P Gupta, J Markus, M Nasir Security, Privacy and User Interaction, 5-22, 2020 | 106 | 2020 |
Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication H Siadati, T Nguyen, P Gupta, M Jakobsson, N Memon Computers & Security 65, 14-28, 2017 | 106 | 2017 |
DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices T Van Nguyen, N Sae-Bae, N Memon Computers & Security 66, 115-128, 2017 | 85 | 2017 |
Illusionpin: Shoulder-surfing resistant authentication using hybrid images A Papadopoulos, T Nguyen, E Durmus, N Memon IEEE Transactions on Information Forensics and Security 12 (12), 2875-2889, 2017 | 50 | 2017 |
A Deep Learning Model with Hierarchical LSTMs and Supervised Attention for Anti-Phishing M Nguyen, T Nguyen, T Nguyen Proceedings of the 1st Anti-Phishing Shared Pilot at 4th ACM International …, 2018 | 44 | 2018 |
Tap-based User Authentication for Smartwatches T Nguyen, N Memon Computer & Security, 2018 | 40 | 2018 |
Kid on the phone! Toward automatic detection of children on mobile devices T Nguyen, A Roy, N Memon Computers & Security 84, 334-348, 2019 | 36 | 2019 |
Smartwatches Locking Methods: A Comparative Study. T Nguyen, ND Memon SOUPS, 2017 | 34 | 2017 |
Finger-drawn PIN Authentication On Touch Devices T Nguyen, N Sae-Bae, N Memon Image Processing (ICIP), 2014 IEEE International Conference on, 5002-5006, 2014 | 28* | 2014 |
Verification Code Forwarding Attack H Siadati, T Nguyen, N Memon 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7-9 …, 2015 | 9* | 2015 |
X-platform phishing: Abusing trust for targeted attacks short paper H Siadati, T Nguyen, N Memon Financial Cryptography and Data Security: FC 2017 International Workshops …, 2017 | 5 | 2017 |
Detecting DGA Botnet based on Malware Behavior Analysis K Nguyen Quoc, T Bui, D Le, D Tran, T Nguyen, HT Nguyen Nguyen SoICT 2022: The 11th International Symposium on Information and …, 2022 | 2 | 2022 |
Comparing network security specifications for a network to implement a network security policy for the network T Nguyen US Patent 11,405,426, 2022 | 2 | 2022 |
Comparing network security specifications across equivalent networks T Nguyen US Patent App. 16/675,678, 2021 | 2 | 2021 |
User Identification and Authentication on Emerging Interfaces T Van Nguyen New York University Tandon School of Engineering, 2018 | 2 | 2018 |
Hệ phần mềm nhận dạng vân tay tự động NTH Lan, NN Kỷ, NTH Thuỷ, NV Toàn Tạp chí Công nghệ thông tin và Truyền thông, 45-52, 2011 | 1 | 2011 |
Bảo mật truy cập dựa trên BioPKI và ứng dụng để bảo mật hệ nhận dạng vân tay C@ FRIS NV Toàn, NTH Thuỷ, NN Kỷ, NTH Lan Chuyên san tạp chí Thông tin, Khoa học công nghệ của Bộ Thông tin và Truyền …, 2011 | 1 | 2011 |
Xây dựng giải pháp bảo mật BioPKI và ứng dụng để bảo mật hệ thống nhận dạng vân tay NTH Thuỷ, NV Toàn, NN Kỷ, NTH Lan Kỷ yếu hội thảo quốc gia: Một số vấn đề chọn lọc của Công nghệ thông tin và …, 2010 | 1 | 2010 |
BioPKI model and Remote Access Control using Bio-Etoken in BioPKI System NTH Lan, N Van Toan IEEE-RIVF 2010 Addendum Contribution Proceeding, 50-53, 2010 | 1 | 2010 |
Comparing network security specifications for a network T Nguyen US Patent 11,716,358, 2023 | | 2023 |