default search action
Nguyen Hoang Nga
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Don Nalin Dharshana Jayaratne, Suraj Harsha Kamtam, Siraj Ahmed Shaikh, Muhamad Azfar Ramli, Qian Lu, Rakhi Manohar Mepparambath, Hoang Nga Nguyen, Abdur Rakib:
A simulation framework for automotive cybersecurity risk assessment. Simul. Model. Pract. Theory 136: 103005 (2024) - 2023
- [j15]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, Jeremy W. Bryans, Charles Wartnaby:
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j14]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj Ahmed Shaikh:
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. Inf. 14(9): 481 (2023) - [j13]Rhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj Ahmed Shaikh, Charles Wartnaby:
A formal framework for security testing of automotive over-the-air update systems. J. Log. Algebraic Methods Program. 130: 100812 (2023) - [j12]Hoang Nga Nguyen, Abdur Rakib:
Formal Modelling and Verification of Probabilistic Resource Bounded Agents. J. Log. Lang. Inf. 32(5): 829-859 (2023) - [j11]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh:
Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges. Sensors 23(1): 134 (2023) - 2022
- [j10]Shahid Mahmood, Hoang Nga Nguyen, Siraj Ahmed Shaikh:
Systematic threat assessment and security testing of automotive over-the-air (OTA) updates. Veh. Commun. 35: 100468 (2022) - [c36]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, David Evans:
Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons. NOMS 2022: 1-6 - [c35]Hesamaldin Jadidbonab, Hoang Nga Nguyen, Siraj Ahmed Shaikh, Marcin Hlond, Peter Robertson, Gajinder Panesar:
A Hardware-based SoC Monitoring In-life Solution for Automotive Industry. PerCom Workshops 2022: 637-642 - 2021
- [c34]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh, David Evans, David Price:
Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges. DSN Workshops 2021: 19-26 - [c33]Rhys Kirk, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price:
Formalising UPTANE in CSP for Security Testing. QRS Companion 2021: 816-824 - [c32]Hesamaldin Jadidbonab, Andrew Tomlinson, Hoang Nga Nguyen, Trang Doan, Siraj Ahmed Shaikh:
A Real-Time In-Vehicle Network Testbed for Machine Learning-Based IDS Training and Validation. AI-Cybersec@SGAI 2021: 53-68 - 2020
- [c31]Shahid Mahmood, Alexy Fouillade, Hoang Nga Nguyen, Siraj A. Shaikh:
A Model-Based Security Testing Approach for Automotive Over-The-Air Updates. ICST Workshops 2020: 6-13
2010 – 2019
- 2019
- [c30]Hoang Nga Nguyen, Abdur Rakib:
Probabilistic Resource-bounded Alternating-time Temporal Logic. AAMAS 2019: 2141-2143 - [c29]Jeremy W. Bryans, Hoang Nga Nguyen, Siraj A. Shaikh:
Attack Defense Trees with Sequential Conjunction. HASE 2019: 247-252 - [c28]Hoang Nga Nguyen, Siamak Tavakoli, Siraj Ahmed Shaikh, Oliver Maynard:
Developing a QRNG ECU for Automotive Security: Experience of Testing in the Real-World. ICST Workshops 2019: 61-68 - [c27]Hoang Nga Nguyen, Abdur Rakib:
A Probabilistic Logic for Resource-Bounded Multi-Agent Systems. IJCAI 2019: 521-527 - [c26]Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh, Fengjun Zhou:
A Template-Based Method for the Generation of Attack Trees. WISTP 2019: 155-165 - 2018
- [j9]Hoang Nga Nguyen, Natasha Alechina, Brian Logan, Abdur Rakib:
Alternating-time temporal logic with resource bounds. J. Log. Comput. 28(4): 631-663 (2018) - [c25]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach:
Software Model Checking for Mobile Security - Collusion Detection in \mathbb K K. SPIN 2018: 3-25 - 2017
- [j8]Natasha Alechina, Nils Bulling, Brian Logan, Hoang Nga Nguyen:
The virtues of idleness: A decidable fragment of resource agent logic. Artif. Intell. 245: 56-85 (2017) - [j7]Natasha Alechina, Brian Logan, Hoang Nga Nguyen, Franco Raimondi:
Model-checking for Resource-Bounded ATL with production and consumption of resources. J. Comput. Syst. Sci. 88: 126-144 (2017) - [j6]Harsha Kumara Kalutarage, Hoang Nga Nguyen, Siraj Ahmed Shaikh:
Towards a threat assessment framework for apps collusion. Telecommun. Syst. 66(3): 417-430 (2017) - [c24]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper. FTfJP@ECOOP 2017: 1:1-1:2 - [c23]Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh:
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. WISTP 2017: 113-129 - [i4]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Software Model Checking: A Promising Approach to Verify Mobile App Security. CoRR abs/1706.04741 (2017) - 2016
- [c22]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. IMPS@ESSoS 2016: 29-37 - [c21]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications. FMICS-AVoCS 2016: 142-149 - [c20]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Helen Treharne, Xu Wang:
OnTrack: The Railway Verification Toolset - Extended Abstract. ISoLA (2) 2016: 294-296 - [c19]Anne Elisabeth Haxthausen, Hoang Nga Nguyen, Markus Roggenbach:
Comparing Formal Verification Approaches of Interlocking Systems. RSSRail 2016: 160-177 - [c18]Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. WISTP 2016: 262-269 - [i3]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. CoRR abs/1603.02308 (2016) - 2015
- [c17]Natasha Alechina, Brian Logan, Hoang Nga Nguyen, Franco Raimondi, Leonardo Mostarda:
Symbolic Model-checking for Resource-Bounded ATL. AAMAS 2015: 1809-1810 - [c16]Natasha Alechina, Brian Logan, Hoang Nga Nguyen, Franco Raimondi:
Symbolic Model Checking for One-Resource RB+-ATL. IJCAI 2015: 1069-1075 - [c15]Natasha Alechina, Nils Bulling, Brian Logan, Hoang Nga Nguyen:
On the Boundary of (Un)decidability: Decidable Model-Checking for a Fragment of Resource Agent Logic. IJCAI 2015: 1494-1501 - [c14]Nils Bulling, Hoang Nga Nguyen:
Model Checking Resource Bounded Systems with Shared Resources via Alternating Büchi Pushdown Systems. PRIMA 2015: 640-649 - [i2]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Franco Raimondi:
Technical Report: Model-Checking for Resource-Bounded ATL with Production and Consumption of Resources. CoRR abs/1504.06766 (2015) - [i1]Nils Bulling, Hoang Nga Nguyen:
Model Checking Resource Bounded Systems with Shared Resources via Alternating Büchi Pushdown Systems. CoRR abs/1508.02326 (2015) - 2014
- [j5]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
On modelling and verifying railway interlockings: Tracking train lengths. Sci. Comput. Program. 96: 315-336 (2014) - [j4]Phillip James, Faron Moller, Nguyen Hoang Nga, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Techniques for modelling and verifying railway interlockings. Int. J. Softw. Tools Technol. Transf. 16(6): 685-711 (2014) - [c13]Natasha Alechina, Brian Logan, Hoang Nga Nguyen, Franco Raimondi:
Decidable Model-Checking for a Resource Logic with Production of Resources. ECAI 2014: 9-14 - 2013
- [c12]Phillip James, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne, Matthew Trumble, David M. Williams:
Verification of Scheme Plans Using CSP $$||$$ | | B. SEFM Workshops 2013: 189-204 - 2012
- [j3]Markus Roggenbach, Faron Moller, Steve A. Schneider, Helen Treharne, Hoang Nga Nguyen:
Railway modelling in CSP||B: the double junction case study. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 53 (2012) - [c11]Faron Moller, Hoang Nga Nguyen, Markus Roggenbach, Steve A. Schneider, Helen Treharne:
Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Haifa Verification Conference 2012: 193-208 - [c10]Yoshinao Isobe, Faron Moller, Hoang Nga Nguyen, Markus Roggenbach:
Safety and Line Capacity in Railways - An Approach in Timed CSP. IFM 2012: 54-68 - 2011
- [b1]Nguyen Hoang Nga:
Reasoning about resource-bounded multi-agent systems. University of Nottingham, UK, 2011 - [j2]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Logic for coalitions with bounded resources. J. Log. Comput. 21(6): 907-937 (2011) - 2010
- [c9]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Resource-bounded alternating-time temporal logic. AAMAS 2010: 481-488 - [c8]Nguyen Hoang Nga:
An Extension of RB-ATL. MALLOW 2010 - [c7]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Automated Verification of Resource Requirements in Multi-Agent Systems Using Abstraction. MoChArt 2010: 69-84
2000 – 2009
- 2009
- [j1]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Verifying time, memory and communication bounds in systems of reasoning agents. Synth. 169(2): 385-403 (2009) - [c6]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
A Logic for Coalitions with Bounded Resources. IJCAI 2009: 659-664 - [c5]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Expressing Properties of Coalitional Ability under Resource Bounds. LORI 2009: 1-14 - 2008
- [c4]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Verifying time, memory and communication bounds in systems of reasoning agents. AAMAS (2) 2008: 736-743 - [c3]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Reasoning about Other Agents' Beliefs under Bounded Resources. KRAMAS 2008: 1-15 - [c2]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Verifying Time and Communication Costs of Rule-Based Reasoners. MoChArt 2008: 1-14 - [c1]Natasha Alechina, Brian Logan, Nguyen Hoang Nga, Abdur Rakib:
Verifying Resource Requirements for Distributed Rule-Based Systems. RuleML 2008: 31-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint