Skip to main content Skip to main navigation menu Skip to site footer
  • Home
  • About ICT
    • About the Journal
    • Editorial Board
    • Publication
  • Submission Online
  • Issues
    • Current
    • Archives
  • Guiding Submission
    • Author Guidelines
    • Download Documents
  • Journal of Science and Technique
Search

Language:

  • Register
  • Login
Search
  1. Home /
  2. Archives /
  3. Vol. 13 No. 02 (2024)

Vol. 13 No. 02 (2024)

					View Vol. 13 No. 02 (2024)
Published: 2025-01-23
  • Table of Contents

Articles

  • THE POST-QUANTUM AND PUBLIC-KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON’S THEORY OF PERFECT SECRECY

    Hong Dung Luu, Phuong Trang Nong
    • PDF
  • FACIAL RECOGNITION-BASED APPROACH FOR EFFICIENT PERSONAL INFORMATION RETRIEVAL IN CYBERSPACE

    Hai-Hong Phan
    • PDF
  • A COMBINATION OF DEEP LEARNING AND DENSITY METHOD IN ANOMALOUS HUMAN TRAJECTORY DETECTION

    Thi Lan Doi, Cong Dai Nguyen
    • PDF
  • A COLLABORATIVE POSSIBILISTIC FUZZY C-MEANS CLUSTERING APPROACH FOR MULTI-DIMENSIONAL DATA ANALYSIS

    Viet Duc Do, Dinh Sinh Mai, Long Thanh Ngo
    • PDF
  • MITIGATING POISONING ATTACKS TO FEDERATED LEARNING IN IoTs ANOMALY DETECTION WITH ATTENTION AGGREGATION

    Ly Vu, Tuan Phong Tran, Van Cuong Nguyen, Quang Uy Nguyen
    • PDF
  • IMPROVING PERFORMANCE OF VIETNAMESE SPEAKER RECOGNITION USING TRANSFER LEARNING AND ENSEMBLE EMBEDDING

    Tan Hoang Ho, Cao Truong Tran
    • PDF
  • ANALYSIS OF OUTAGE PROBABILITY AND INTERCEPT PROBABILITY TRADE-OFF FOR SECURE TWO-WAY RELAYING SCHEMES BETWEEN TWO CLUSTERS OF NODES USING FOUNTAIN CODES

    Thi-Hau Nguyen, Minh Nam Pham, Trung Duy Tran, Lam-Thanh Tu, Van Khuong Ho
    • PDF
  • CVE VULNERABILITY CLASSIFICATION IN SOURCE CODE BASED ON TOKEN ANALYSIS AND LSTM NETWORKS

    Van Cong Nguyen, Huy Toan Le, Minh Thanh Ta
    • PDF

Index by

 

Member of

Our Resources & Media

Author Services

Journal Content

Flag Counter

Reference Links

Web of Science
Scopus
Google Scholar
ResearchGate
ASEAN CITATION INDEX