Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About ICT
About the Journal
Editorial Board
Publication
Submission Online
Issues
Current
Archives
Guiding Submission
Author Guidelines
Download Documents
Journal of Science and Technique
Search
Search
Language:
Register
Login
Search
Search
Home
/
Archives
/
Vol. 13 No. 02 (2024)
Vol. 13 No. 02 (2024)
Published:
2025-01-17
Table of Contents
Articles
THE POST-QUANTUM AND PUBLIC-KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON’S THEORY OF PERFECT SECRECY
Hong Dung Luu, Phuong Trang Nong
PDF
FACIAL RECOGNITION-BASED APPROACH FOR EFFICIENT PERSONAL INFORMATION RETRIEVAL IN CYBERSPACE
Hai-Hong Phan
PDF
A COMBINATION OF DEEP LEARNING AND DENSITY METHOD IN ANOMALOUS HUMAN TRAJECTORY DETECTION
Thi Lan Doi, Cong Dai Nguyen
PDF
A COLLABORATIVE POSSIBILISTIC FUZZY C-MEANS CLUSTERING APPROACH FOR MULTI-DIMENSIONAL DATA ANALYSIS
Viet Duc Do, Dinh Sinh Mai, Long Thanh Ngo
PDF
MITIGATING POISONING ATTACKS TO FEDERATED LEARNING IN IOTS ANOMALY DETECTION WITH ATTENTION AGGREGATION
Ly Vu, Tuan Phong Tran, Van Cuong Nguyen, Quang Uy Nguyen
PDF
IMPROVING PERFORMANCE OF VIETNAMESE SPEAKER RECOGNITION USING TRANSFER LEARNING AND ENSEMBLE EMBEDDING
Tan Hoang Ho, Cao Truong Tran
PDF
ANALYSIS OF OUTAGE PROBABILITY AND INTERCEPT PROBABILITY TRADE-OFF FOR SECURE TWO-WAY RELAYING SCHEMES BETWEEN TWO CLUSTERS OF NODES USING FOUNTAIN CODES
Thi-Hau Nguyen, Minh Nam Pham, Trung Duy Tran, Lam-Thanh Tu, Van Khuong Ho
PDF
CVE VULNERABILITY CLASSIFICATION IN SOURCE CODE BASED ON TOKEN ANALYSIS AND LSTM NETWORKS
Van Cong Nguyen, Huy Toan Le, Minh Thanh Ta
PDF
Index by
Member of
Our Resources & Media
Author Services
Journal Content
Search
Search Scope
All
Authors
Titles
Search
Reference Links
Web of Science
Scopus
Google Scholar
ResearchGate
ASEAN CITATION INDEX