<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>Vol. 24, No.2</title>
<link href="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/165" rel="alternate"/>
<subtitle/>
<id>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/165</id>
<updated>2026-05-17T17:01:26Z</updated>
<dc:date>2026-05-17T17:01:26Z</dc:date>
<entry>
<title>A program anomaly intrusion detection scheme based on fuzzy inference</title>
<link href="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/310" rel="alternate"/>
<author>
<name>Hoang, Dau Xuan</name>
</author>
<author>
<name>Nguyen, Minh Ngoc</name>
</author>
<id>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/310</id>
<updated>2011-04-18T02:19:19Z</updated>
<published>2008-01-01T00:00:00Z</published>
<summary type="text">A program anomaly intrusion detection scheme based on fuzzy inference
Hoang, Dau Xuan; Nguyen, Minh Ngoc
A major problem of existing anomaly intrusion detection approaches is that they tend to&#13;
produce excessive false alarms. One reason for this is that the normal and abnormal behaviour of&#13;
a monitored object can overlap or be very close to each other, which makes it difficult to define a&#13;
clear boundary between the two. In this paper, we present a fuzzy-based scheme for program&#13;
anomaly intrusion detection using system calls. Instead of using crisp conditions, or fixed&#13;
thresholds, fuzzy sets are used to represent the parameter space of the program sequences of&#13;
system calls. In addition, fuzzy rules are used to combine multiple parameters of each sequence,&#13;
using fuzzy reasoning, in order to determine the sequence status. Experimental results showed that&#13;
the proposed fuzzy-based detection scheme reduced false positive alarms by 48%, compared to the&#13;
normal database scheme.
</summary>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Finding upper bounds of component instances with deallocation beyond local scope</title>
<link href="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/309" rel="alternate"/>
<author>
<name>Hoang, A. Truong</name>
</author>
<id>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/309</id>
<updated>2011-04-18T02:16:01Z</updated>
<published>2008-01-01T00:00:00Z</published>
<summary type="text">Finding upper bounds of component instances with deallocation beyond local scope
Hoang, A. Truong
We develop an abstract component language and a static type system that can tells us&#13;
the maximum resources a program may use. We prove that the upper resource bound is sharp and&#13;
we point out a polynomial algorithm that can infer the sharp bound. Knowing the maximal&#13;
resources a program may request allows us to adjust resource usage of the program and to prevent&#13;
it from raising exceptions or behaving unexpectedly on systems that do not have enough resources.&#13;
This work extends our previous works in one crucial point: the deallocation primitive can free an&#13;
instance beyond its local scope. This semantics makes the language much closer to practical ones.
</summary>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Checking the conformability in CORBA component model specifications</title>
<link href="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/307" rel="alternate"/>
<author>
<name>Tran, Thi Mai Thuong</name>
</author>
<author>
<name>Vo, Van Thanh</name>
</author>
<author>
<name>Truong, Ninh Thuan</name>
</author>
<id>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/307</id>
<updated>2011-04-18T02:08:57Z</updated>
<published>2008-01-01T00:00:00Z</published>
<summary type="text">Checking the conformability in CORBA component model specifications
Tran, Thi Mai Thuong; Vo, Van Thanh; Truong, Ninh Thuan
We proposed in this paper an approach for checking the conformability in CORBA&#13;
component model specifications. In software engineering, it is demonstrated that discovering bugs&#13;
in earlier phases is much more economical than later phases. We focused thus on verifying&#13;
components by their ports specification. In order to do this, firstly we determined constraints on&#13;
kinds of port as well as on types of port which the connection between ports must satisfy, and then&#13;
formalized them to be able to prove automatically using formal prover tools. Here, we proposed to&#13;
use the B method for verifying components in a CCM specification
</summary>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Conflicting chip firing games on graphs and on trees</title>
<link href="http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/305" rel="alternate"/>
<author>
<name>Pham, Tra An</name>
</author>
<author>
<name>Phan, Thi Ha Duong</name>
</author>
<author>
<name>Tran, Thi Thu Huong</name>
</author>
<id>http://tainguyenso.vnu.edu.vn/jspui/handle/123456789/305</id>
<updated>2011-04-18T02:06:34Z</updated>
<published>2008-01-01T00:00:00Z</published>
<summary type="text">Conflicting chip firing games on graphs and on trees
Pham, Tra An; Phan, Thi Ha Duong; Tran, Thi Thu Huong
Chip Firing Games on (directed) graph are widely used in theoretical computer science&#13;
and many other sciences. In this model, chips are fired from one vertex to all of its neighbors at the&#13;
same time. The purpose of our paper is to study an extended version of this model, the Conflicting&#13;
Chip Firing Game, by considering that chips can be fired from one vertex to one of its neighbors at&#13;
each time. Our main results are obtained when the support graph of this game is a rooted tree. In&#13;
this case, we give the characterization of its reachable configurations and of its fixed points.&#13;
Moreover we show the local lattice structure of its configuration space
</summary>
<dc:date>2008-01-01T00:00:00Z</dc:date>
</entry>
</feed>
