default search action
Phu Hong Nguyen
Person information
Other persons with a similar name
- Phuc Nguyen Hong
- Phuc Tran Nguyen Hong
- Hong-Phuc Nguyen
- Hong-Phuong Nguyen
- Hong Phuoc Nguyen
- Phuc Hong Nguyen (aka: Hong Phuc Nguyen) — disambiguation page
- Nguyen Hong Phuc
- Nguyen Hong Phuong
- Nguyen Thi Hong Phuong
- Hong-Phuc Vo-Nguyen
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Tim Menzies, Bowen Xu, Hong Jin Kang, Jie M. Zhang, Jiri Gesi, Sagar Sen, Beatriz Cassoli, Nicolas Jourdan, Jieke Shi, Phu Hong Nguyen, Valentina Golendukhina:
SEA4DQ 2024 Workshop Summary. ACM SIGSOFT Softw. Eng. Notes 49(4): 29-30 (2024) - [j15]Sagar Sen, Erik Johannes Husom, Arda Goknil, Simeon Tverdal, Phu Hong Nguyen:
Uncertainty-Aware Virtual Sensors for Cyber-Physical Systems. IEEE Softw. 41(2): 77-87 (2024) - 2023
- [j14]Mauro Isaja, Phu Hong Nguyen, Arda Goknil, Sagar Sen, Erik Johannes Husom, Simeon Tverdal, Abhilash Anand, Yunman Jiang, Karl John Pedersen, Per Myrseth, Jørgen Stang, Harris Niavis, Simon Pfeifhofer, Patrick Lamplmair:
A blockchain-based framework for trusted quality data sharing towards zero-defect manufacturing. Comput. Ind. 146: 103853 (2023) - [j13]Sagar Sen, Erik Johannes Husom, Arda Goknil, Dimitra Politaki, Simeon Tverdal, Phu Hong Nguyen, Nicolas Jourdan:
Virtual sensors for erroneous data repair in manufacturing a machine learning pipeline. Comput. Ind. 149: 103917 (2023) - [j12]Arda Goknil, Phu Hong Nguyen, Sagar Sen, Dimitra Politaki, Harris Niavis, Karl John Pedersen, Abdillah Suyuthi, Abhilash Anand, Amina Ziegenbein:
A Systematic Review of Data Quality in CPS and IoT for Industry 4.0. ACM Comput. Surv. 55(14s): 327:1-327:38 (2023) - [j11]Espen Tønnessen Nordli, Sindre Grønstøl Haugeland, Phu Hong Nguyen, Hui Song, Franck Chauvel:
Migrating monoliths to cloud-native microservices for customizable SaaS. Inf. Softw. Technol. 160: 107230 (2023) - [j10]Phu Hong Nguyen, Sagar Sen, Beatriz Bretones-Cassoli, Nicolas Jourdan, Maria Chiara Magnanini:
Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things - SEA4DQ'22 Report. ACM SIGSOFT Softw. Eng. Notes 48(1): 108-111 (2023) - [c28]Erkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli:
The DYNABIC approach to resilience of critical infrastructures. ARES 2023: 136:1-136:8 - [c27]Phu Hong Nguyen, Rustem Dautov, Hui Song, Angel Rego, Eider Iturbe, Erkuden Rios, Diego Sagasti, Gonzalo Nicolas, Valeria Valdés, Wissam Mallouli, Ana R. Cavalli, Nicolas Ferry:
Towards Smarter Security Orchestration and Automatic Response for CPS and IoT. CloudCom 2023: 298-302 - [c26]Simeon Tverdal, Arda Goknil, Phu Hong Nguyen, Erik Johannes Husom, Sagar Sen, Jan Ruh, Francesca Flamigni:
Edge-based Data Profiling and Repair as a Service for IoT. IoT 2023: 17-24 - [c25]Erik Johannes Husom, Arda Goknil, Simeon Tverdal, Sagar Sen, Phu Hong Nguyen:
Automated Behavior Labeling for IIoT Data. IoT 2023: 174-178 - [c24]Erik Johannes Husom, Sagar Sen, Arda Goknil, Simeon Tverdal, Phu Hong Nguyen:
REPTILE: a Tool for Replay-driven Continual Learning in IIoT. IoT 2023: 204-207 - 2022
- [j9]Saulo S. de Toledo, Antonio Martini, Phu Hong Nguyen, Dag I. K. Sjøberg:
Accumulation and Prioritization of Architectural Debt in Three Companies Migrating to Microservices. IEEE Access 10: 37422-37445 (2022) - [j8]Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:
A decade of research on patterns and architectures for IoT security. Cybersecur. 5(1): 2 (2022) - [j7]Phu Hong Nguyen, Sagar Sen, Nicolas Jourdan, Beatriz Cassoli, Per Myrseth, Mikel Armendia, Odd Myklebust:
Software Engineering and AI for Data Quality in Cyber- Physical Systems - SEA4DQ'21 Workshop Report. ACM SIGSOFT Softw. Eng. Notes 47(1): 26-29 (2022) - [j6]Sagar Sen, Erik Johannes Husom, Arda Goknil, Simeon Tverdal, Phu Hong Nguyen, Iker Mancisidor:
Taming Data Quality in AI-Enabled Industrial Internet of Things. IEEE Softw. 39(6): 35-42 (2022) - [c23]Huu-Ha Nguyen, Phu H. Phung, Phu Hong Nguyen, Hong-Linh Truong:
Context-driven Policies Enforcement for Edge-based IoT Data Sharing-as-a-Service. SCC 2022: 221-230 - [e1]Phu Hong Nguyen, Sagar Sen, Maria Chiara Magnanini:
Proceedings of the 2nd International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of Things, SEA4DQ 2022, Singapore, Singapore, 17 November 2022. ACM 2022, ISBN 978-1-4503-9459-8 [contents] - 2021
- [c22]Gencer Erdogan, Enrique Garcia-Ceja, Åsmund Hugo, Phu Hong Nguyen, Sagar Sen:
A Systematic Mapping Study on Approaches for Al-Supported Security Risk Assessment. COMPSAC 2021: 755-760 - [c21]Sindre Grønstøl Haugeland, Phu Hong Nguyen, Hui Song, Franck Chauvel:
Migrating Monoliths to Microservices-based Customizable Multi-tenant Cloud-native Apps. SEAA 2021: 170-177 - 2020
- [j5]Nicolas Ferry, Phu Hong Nguyen, Hui Song, Erkuden Rios, Eider Iturbe, Satur Martinez, Angel Rego:
Continuous Deployment of Trustworthy Smart IoT Systems. J. Object Technol. 19(2): 16:1-23 (2020) - [c20]Espen Tønnessen Nordli, Phu Hong Nguyen, Franck Chauvel, Hui Song:
Event-Based Customization of Multi-tenant SaaS Using Microservices. COORDINATION 2020: 171-180 - [c19]Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:
Research Landscape of Patterns and Architectures for IoT Security: A Systematic Review. SEAA 2020: 463-470 - [c18]Tanusan Rajmohan, Phu Hong Nguyen, Nicolas Ferry:
A Systematic Mapping of Patterns and Architectures for IoT Security. IoTBDS 2020: 138-149 - [c17]Phu Hong Nguyen, Åsmund Hugo, Karl Svantorp, Bjørn Magne Elnes:
Towards a Simulation Framework for Edge-to-Cloud Orchestration in C-ITS. MDM 2020: 354-358 - [p1]Hui Song, Franck Chauvel, Phu Hong Nguyen:
Using Microservices to Customize Multi-tenant Software-as-a-Service. Microservices, Science and Engineering 2020: 299-331
2010 – 2019
- 2019
- [c16]Nicolas Ferry, Phu Hong Nguyen, Hui Song, Pierre-Emmanuel Novac, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
GeneSIS: Continuous Orchestration and Deployment of Smart IoT Systems. COMPSAC (1) 2019: 870-875 - [c15]Nicolas Ferry, Jacek Dominiak, Anne Gallon, Elena González-Vidal, Eider Iturbe, Stéphane Lavirotte, Saturnino Martinez, Andreas Metzger, Victor Muntés-Mulero, Phu Hong Nguyen, Alexander Palm, Angel Rego, Erkuden Rios, Diego Riviera, Arnor Solberg, Hui Song, Jean-Yves Tigli, Thierry Winter:
Development and Operation of Trustworthy Smart IoT Systems: The ENACT Framework. DEVOPS 2019: 121-138 - [c14]Phu Hong Nguyen, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
Advances in Deployment and Orchestration Approaches for IoT - A Systematic Review. ICIOT 2019: 53-60 - [c13]Hui Song, Phu Hong Nguyen, Franck Chauvel, Jens M. Glattetre, Thomas Schjerpen:
Customizing Multi-Tenant SaaS by Microservices: A Reference Architecture. ICWS 2019: 446-448 - [c12]Phu Hong Nguyen, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
A Systematic Mapping Study of Deployment and Orchestration Approaches for IoT. IoTBDS 2019: 69-82 - [c11]Hui Song, Phu Hong Nguyen, Franck Chauvel:
Using Microservices to Customize Multi-Tenant SaaS: From Intrusive to Non-Intrusive. Microservices 2019: 1:1-1:18 - [c10]Nicolas Ferry, Phu Hong Nguyen:
Towards Model-Based Continuous Deployment of Secure IoT Systems. MoDELS (Companion) 2019: 613-618 - [c9]Phu Hong Nguyen, Nicolas Ferry, Gencer Erdogan, Hui Song, Stéphane Lavirotte, Jean-Yves Tigli, Arnor Solberg:
The preliminary results of a mapping study of deployment and orchestration for IoT. SAC 2019: 2040-2043 - [c8]Phu Hong Nguyen, Hui Song, Franck Chauvel, Roy Müller, Seref Boyar, Erik Levin:
Using microservices for non-intrusive customization of multi-tenant SaaS. ESEC/SIGSOFT FSE 2019: 905-915 - 2018
- [c7]Phu Hong Nguyen, Phu H. Phung, Hong Linh Truong:
A security policy enforcement framework for controlling IoT tenant applications in the edge. IOT 2018: 4:1-4:8 - 2017
- [j4]Phu Hong Nguyen, Shaukat Ali, Tao Yue:
Model-based security engineering for cyber-physical systems: A systematic mapping study. Inf. Softw. Technol. 83: 116-135 (2017) - 2015
- [b1]Phu Hong Nguyen:
Model-Driven Security With Modularity and Reusability For Engineering Secure Software Systems. University of Luxembourg, 2015 - [j3]Phu Hong Nguyen, Max E. Kramer, Jacques Klein, Yves Le Traon:
An extensive systematic review on the Model-Driven Development of secure systems. Inf. Softw. Technol. 68: 62-81 (2015) - [c6]Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, Yves Le Traon:
SoSPa: A system of Security design Patterns for systematically engineering secure systems. MoDELS 2015: 246-255 - [i1]Phu Hong Nguyen, Max E. Kramer, Jacques Klein, Yves Le Traon:
An Extensive Systematic Review on Model-Driven Development of Secure Systems. CoRR abs/1505.06557 (2015) - 2014
- [j2]Levi Lucio, Qin Zhang, Phu Hong Nguyen, Moussa Amrani, Jacques Klein, Hans Vangheluwe, Yves Le Traon:
Advances in Model-Driven Security. Adv. Comput. 93: 103-152 (2014) - [c5]Phu Hong Nguyen, Jacques Klein, Yves Le Traon:
Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach. ESSoS Doctoral Symposium 2014 - [c4]Phu Hong Nguyen, Jacques Klein, Yves Le Traon:
Model-Driven Security with A System of Aspect-Oriented Security Design Patterns. VAO@STAF 2014: 51-54 - 2013
- [j1]Phu Hong Nguyen, Grégory Nain, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. LNCS Trans. Aspect Oriented Softw. Dev. 11: 109-144 (2013) - [c3]Phu Hong Nguyen, Grégory Nain, Jacques Klein, Tejeddine Mouelhi, Yves Le Traon:
Model-driven adaptive delegation. AOSD 2013: 61-72 - [c2]Phu Hong Nguyen, Jacques Klein, Yves Le Traon, Max E. Kramer:
A Systematic Review of Model-Driven Security. APSEC (1) 2013: 432-441 - [c1]Phu Hong Nguyen, Mike Papadakis, Iram Rubab:
Testing Delegation Policy Enforcement via Mutation Analysis. ICST Workshops 2013: 34-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint