TS. Trần Lê Minh Sang

Amanda Wilson

Trần Lê Minh Sang

Giảng viên

Tiến sĩ

University of Trento, Italy

Lĩnh vực nghiên cứu:

STUDY:

2014: Ph.D., Computer Science, University of Trento, Italy
2009: M.Sc., Computer Science, RWTH Aachen University, Germany & University of Trento, Italy
2006: B.Sc., Computer Science, Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, Vietnam

PUBLICATION:

  1. Le, M., Nguyen, N., & Luong, N. H. (2023). Efficacy of Neural Prediction-Based Zero-Shot NAS. arXiv preprint arXiv:2308.16775.
  2. Phan, T., Nguyen, H. P. A., Dang, C. K., Phan, M. T., Nguyen, V. T., Le, V. T., … & Nguyen, N. P. T. (2023). Sleep Quality and Poor Sleep-related Factors Among Healthcare Workers During the COVID-19 Pandemic in Vietnam. Journal of Preventive Medicine and Public Health56(4), 319.
  3. Le, T., Tran, L. L., Hoang, T. H., Han, H. D., Phan, N. T., Nguyen, V. C., … & Nguyen, C. K. (2019, May). MD-Link: A portable ECG monitoring device with active dry electrodes and its validation. In 2019 IEEE MTT-S International Microwave Biomedical Conference (IMBioC) (Vol. 1, pp. 1-4). IEEE.
  4. Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., … & Breu, R. (2015). Evolution of security engineering artifacts: A state of the art survey. Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications, 1508-1562.
  5. Felderer, M., Katt, B., Kalb, P., Jürjens, J., Ochoa, M., Paci, F., … & Breu, R. (2014). Evolution of security engineering artifacts: a state of the art survey. International Journal of Secure Software Engineering (IJSSE)5(4), 48-98.
  6. Massacci, F., Paci, F., & Tedeschi, A. (2014). Assessing a requirements evolution approach: Empirical studies in the air traffic management domain. Journal of Systems and Software95, 70-88.
  7. Scandariato, R., Paci, F., Sang Tran, L. M., Labunets, K., Yskout, K., Massacci, F., & Joosen, W. (2014). Empirical assessment of security requirements and architecture: Lessons learned. In Engineering Secure Future Internet Services and Systems: Current Research (pp. 35-64). Cham: Springer International Publishing.
  8. Massacci, F. (2014, August). An approach for decision support on the uncertainty in feature model evolution. In 2014 IEEE 22nd International Requirements Engineering Conference (RE) (pp. 93-102). IEEE.
  9. Tran, L. M. S. (2014). Managing the Uncertainty of the Evolution of Requirements Models.
  10. Paci, F., Tran, L. M. S., Becker, K., Moyano, F., Fernandez Gago, C., Scandariato, R., … & Petrocchi, M. (2013). Security requirement patterns for Future Internet applications, and improved modelling of the scenarios.
  11. Labunets, K., Massacci, F., Paci, F., & Tran, L. M. S. (2013, October). An experimental comparison of two risk-based security methods. In 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (pp. 163-172). IEEE.
  12. Tran, L. M. S., Solhaug, B., & Stølen, K. (2013, July). An approach to select cost-effective risk countermeasures. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 266-273). Berlin, Heidelberg: Springer Berlin Heidelberg.
  13. Sang Tran, L. M., & Massacci, F. (2013). Unicorn: A tool for modeling and reasoning on the uncertainty of requirements evolution. In CEUR WORKSHOP PROCEEDINGS (Vol. 998, pp. 161-168). CEUR-WS.
  14. Tran, L. M. S., Solhaug, B., & Stølen, K. (2013). An approach to select cost-effective risk countermeasures exemplified in CORAS. arXiv preprint arXiv:1302.4689.
  15. Sang Tran, L. M. (2013, June). Early dealing with evolving risks in long-life evolving software systems. In International Conference on Advanced Information Systems Engineering (pp. 518-523). Berlin, Heidelberg: Springer Berlin Heidelberg.
  16. Tran, L. M. S., Massacci, F., & Mylopoulos, J. (2011). Requirement evolution: Towards a methodology and framework?. In CAiSE Doctoral Consortium 2011.
  17. Tran, L. M. S., & Massacci, F. (2011, June). Dealing with known unknowns: Towards a game-theoretic foundation for software requirement evolution. In International Conference on Advanced Information Systems Engineering (pp. 62-76). Berlin, Heidelberg: Springer Berlin Heidelberg.
  18. Nguyen, V. H., & Tran, L. M. S. (2010, September). Predicting vulnerable software components with dependency graphs. In Proceedings of the 6th international workshop on security measurements and metrics (pp. 1-8).
Share