Search Results for author: Trung V. Phan

Found 5 papers, 0 papers with code

A Schrödinger Equation for Evolutionary Dynamics

no code implementations29 Jul 2023 Vi D. Ao, Duy V. Tran, Kien T. Pham, Duc M. Nguyen, Huy D. Tran, Tuan K. Do, Van H. Do, Trung V. Phan

We establish an analogy between the Fokker-Planck equation describing evolutionary landscape dynamics and the Schr\"{o}dinger equation which characterizes quantum mechanical particles, showing how a population with multiple genetic traits evolves analogously to a wavefunction under a multi-dimensional energy potential in imaginary time.

Stress-Induced Mutagenesis Can Further Boost Population Success in Static Ecology

no code implementations16 Mar 2023 Kien T. Pham, Duc M. Nguyen, Duy V. Tran, Vi D. Ao, Huy D. Tran, Tuan K. Do, Trung V. Phan

We have developed a mathematical model that captures stress-induced mutagenesis, a fundamental aspect of pathogenic and neoplastic evolutionary dynamics, on the fitness landscape with multiple relevant genetic traits as a high-dimensional Euclidean space.

Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined Networks

no code implementations7 Sep 2019 Trung V. Phan, Mehrdad Hajizadeh, Nguyen Tuan Khai, Thomas Bauschert

This method adapts the number of flow table entries in SDN switches according to the level of detail of traffic flow information that other mechanisms (e. g. for traffic engineering, traffic monitoring, intrusion detection) require.

Intrusion Detection

Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learning

no code implementations4 Sep 2019 Trung V. Phan, Syed Tasnimul Islam, Tri Gia Nguyen, Thomas Bauschert

We first describe and analyse an SDN-based traffic flow matching control system that applies a reinforcement learning approach based on Q-learning algorithm in order to maximize the traffic flow granularity.

Management Q-Learning +2

Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework

no code implementations27 Jul 2019 Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert

We first analyze the adversary model of stealthy DoS attacks, the related vulnerabilities in SDN-based networks and the key characteristics of stealthy DoS attacks.

Anomaly Detection BIG-bench Machine Learning +2

Cannot find the paper you are looking for? You can Submit a new open access paper.