Lĩnh vực nghiên cứu:
STUDY:
2014: Ph.D., Computer Science, University of Trento, Italy
2009: M.Sc., Computer Science, RWTH Aachen University, Germany & University of Trento, Italy
2006: B.Sc., Computer Science, Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, Vietnam
PUBLICATION:
- Le, M., Nguyen, N., & Luong, N. H. (2023). Efficacy of Neural Prediction-Based Zero-Shot NAS. arXiv preprint arXiv:2308.16775.
- Phan, T., Nguyen, H. P. A., Dang, C. K., Phan, M. T., Nguyen, V. T., Le, V. T., … & Nguyen, N. P. T. (2023). Sleep Quality and Poor Sleep-related Factors Among Healthcare Workers During the COVID-19 Pandemic in Vietnam. Journal of Preventive Medicine and Public Health, 56(4), 319.
- Le, T., Tran, L. L., Hoang, T. H., Han, H. D., Phan, N. T., Nguyen, V. C., … & Nguyen, C. K. (2019, May). MD-Link: A portable ECG monitoring device with active dry electrodes and its validation. In 2019 IEEE MTT-S International Microwave Biomedical Conference (IMBioC) (Vol. 1, pp. 1-4). IEEE.
- Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., … & Breu, R. (2015). Evolution of security engineering artifacts: A state of the art survey. Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications, 1508-1562.
- Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., … & Breu, R. (2014). Evolution of security engineering artifacts: a state of the art survey. International Journal of Secure Software Engineering (IJSSE), 5(4), 48-98.
- Massacci, F., Paci, F., & Tedeschi, A. (2014). Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. Journal of Systems and Software, 95, 70-88.
- Scandariato, R., Paci, F., Sang Tran, L. M., Labunets, K., Yskout, K., Massacci, F., & Joosen, W. (2014). Empirical assessment of security requirements and architecture: Lessons learned. In Engineering Secure Future Internet Services and Systems: Current Research (pp. 35-64). Cham: Springer International Publishing.
- Massacci, F. (2014, August). An approach for decision support on the uncertainty in feature model evolution. In 2014 IEEE 22nd International Requirements Engineering Conference (RE) (pp. 93-102). IEEE.
- Tran, L. M. S. (2014). Managing the Uncertainty of the Evolution of Requirements Models.
- Paci, F., Tran, L. M. S., Becker, K., Moyano, F., Fernandez Gago, C., Scandariato, R., … & Petrocchi, M. (2013). Security requirement patterns for Future Internet applications, and improved modelling of the scenarios.
- Labunets, K., Massacci, F., Paci, F., & Tran, L. M. S. (2013, October). An experimental comparison of two risk-based security methods. In 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (pp. 163-172). IEEE.
- Tran, L. M. S., Solhaug, B., & Stølen, K. (2013, July). An approach to select cost-effective risk countermeasures. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 266-273). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Sang Tran, L. M., & Massacci, F. (2013). Unicorn: A tool for modeling and reasoning on the uncertainty of requirements evolution. In CEUR WORKSHOP PROCEEDINGS (Vol. 998, pp. 161-168). CEUR-WS.
- Tran, L. M. S., Solhaug, B., & Stølen, K. (2013). An approach to select cost-effective risk countermeasures exemplified in CORAS. arXiv preprint arXiv:1302.4689.
- Sang Tran, L. M. (2013, June). Early dealing with evolving risks in long-life evolving software systems. In International Conference on Advanced Information Systems Engineering (pp. 518-523). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Tran, L. M. S., Massacci, F., & Mylopoulos, J. (2011). Requirement evolution: Towards a methodology and framework?. In CAiSE Doctoral Consortium 2011.
- Tran, L. M. S., & Massacci, F. (2011, June). Dealing with known unknowns: Towards a game-theoretic foundation for software requirement evolution. In International Conference on Advanced Information Systems Engineering (pp. 62-76). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Nguyen, V. H., & Tran, L. M. S. (2010, September). Predicting vulnerable software components with dependency graphs. In Proceedings of the 6th international workshop on security measurements and metrics (pp. 1-8).
