NPS - Faculty Profiles - Heading

Faculty Profile Directory


Welcome to the NPS Faculty Profile directory. Use the form below to search the NPS faculty profiles. All NPS Faculty may update their profiles by logging into FAIRS.

FacultyCV
Back to Search

Thuy Diep Nguyen

Phone: (831) 656-3989

Scholarly Work

Publications
  • Book Chapter
  • Irvine, C. E., Clark, P. C., & Nguyen, T. D, (2016). Design Principles for Security (Appendix F of NIST SP 800-160) Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems Gaithersburg, MD U.S.A.: National Institutes of Standards and Technology.
  • Conference Proceeding
  • Nguyen, T. D., Nguyen, T. D., & Irvine, C. E, A Strategy for Security Testing Industrial Firewalls.
  • Nguyen, T. D., Nguyen, T. D., Kendrick, M. M., Rucker, Z. A., Hyun, D., & Brown, J. C, Creating Convincing Industrial-Control-System Honeypots.
  • Nguyen, T. D., Nguyen, T. D., & Xie, G. G, (2018). Toward a Deep Learning Approach to Behavior-based AIS Traffic Anomaly Detection.
  • Nguyen, T. D., & Irvine, C. E, (2017). Development of Industrial Network Forensics Lessons.
  • Nguyen, T. D., & Gondree, M. A, (2015). Teaching Industrial Control System Security Using Collaborative Projects.
  • Nguyen, T. D., Gondree, M. A., Khosalim, J., & Irvine, C. E, (2015). Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores.
  • Technical Report
  • Nguyen, T. D, (2016). Network Forensics Lessons for Industrial Control Systems.
  • Nguyen, T. D, (2015). A Study of Covert Communications in Space Platforms Hosting Government Payloads.
  • Shifflett, D. J., & Nguyen, T. D, (2015). An Experiment with RTEMS.
  • Nguyen, T. D, (2015). Towards MIL-STD-1553B Covert Channel Analysis.
  • Clark, P. C., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Life Cycle Management Plan.
  • Clark, P. C., Irvine, C. E., Levin, T., Nguyen, T. D., & Warren, D, (2014). Trusted Computing Exemplar: Configuration Management Plan.
  • Clark, P. C., Irvine, C. E., Levin, T., Nguyen, T. D., & Warren, D, (2014). Trusted Computing Exemplar: Configuration Management Procedures.
  • Clark, P. C., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Personnel Security Plan.
  • Clark, P. C., Hopfner, P., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Physical Security Plan.
  • Clark, P. C., Irvine, C. E., Levin, T., Nguyen, T. D., & Shifflett, D. J, (2014). Trusted Computing Exemplar: Software Development Standards.
  • Clark, P. C., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Low-level Design Document Standards.
  • Clark, P. C., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Quality Assurance Plan.
  • Clark, P. C., Irvine, C. E., Levin, T., & Nguyen, T. D, (2014). Trusted Computing Exemplar: Trusted Distribution Plan – Preliminary Design.