Skip navigation
Statistics
Help
About OPUS
How to Deposit
Managing Copyright
Browse
UTS Organisational Groups
Browse Items by:
Issue Date
Author
Title
Type
ARC/NHRMC Funded
Search OPUS
OPUS at UTS
Browsing byAuthorHoang, D
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
ARC/NHRMC funded
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 24 to 43 of 44
< previous
next >
Issue Date
Title
Author(s)
2019-10-01
MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network
Vo, TT
;
Luong, NT
;
Hoang, D
2009-11-12
Network security considerations for a new generation protocol UDT
Bernardo, DV
;
Hoang, D
2005-12-01
Network support for distributed Web services
Yousef, B
;
Hoang, D
;
Thamsakorn, P
;
Le, H
;
Chan, J
2009-10-19
A new security scheme for E-health system
Li, W
;
Hoang, D
2016-08-23
A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health Records
Dang, TD
;
Hoang, D
;
Nanda, P
2016-01-01
A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health records
Dang, TD
;
Hoang, D
;
Nanda, P
2005-12-01
An optimised geographically-aware overlay network
Le, H
;
Hoang, D
;
Simmonds, A
2006-11-22
PARM: A Physically-Aware Reference Model for Overlay Internetworking
Le, H
;
Hoang, D
;
Simmonds, A
2008-12-01
A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networks
Le, H
;
Schiff, N
;
Plessis, JD
;
Hoang, D
2002-01-01
Practical active network services within content-aware gateways
Subramanian, S
;
Wang, P
;
Durairaj, R
;
Rasimas, J
;
Travostino, F
;
Lavian, T
;
Hoang, D
2010-12-01
Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-API
Bernardo, DV
;
Hoang, D
2009-12-01
Quantitative Security Risk Assessment (SRA) method: An empirical case study
Bernardo, DV
;
Chua, BB
;
Hoang, D
2019-11-29
Realisation of congestion-aware energy-aware virtual link embedding
Pham, MNT
;
Chaczko, Z
;
Hoang, D
2002
Resource Allocating for Video-on-Demand with Delayed Multicast Protocol
Nguyen, DNC
;
Hoang, D
;
Symvonis, A
;
NA
2008-09-25
S-Web: An efficient and self-organizing wireless sensor network model
Le, H
;
Hoang, D
;
Poliah, R
2010-07-20
Security analysis of the proposed practical security mechanisms for high speed data transfer protocol
Bernardo, DV
;
Hoang, D
2005-09-12
A self-organising model for topology-aware overlay formation
Le, H
;
Hoang, D
;
Simmonds, A
2020-05
Software-Defined Virtual Sensors for Provisioning IoT Services on Demand
Nguyen, C
;
Hoang, D
2020
Trust-based Scheduling Framework for Big Data Processing with MapReduce
Dang, D
;
Hoang, D
;
Nguyen, D
2013-09-12
Visual analytics for intrusion detection in spam emails
Zhang, J
;
Huang, ML
;
Hoang, D