Nhien-An Le-Khac
NhienAn LeKhac
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j10]Jacques Boucher, Nhien-An Le-Khac:
Forensic framework to identify local vs synced artefacts. Digital Investigation 24: S68-S75 (2018) - [i44]Saad Alabdulsalam, Kevin Schaefer, M. Tahar Kechadi, Nhien-An Le-Khac:
Internet of things forensics: Challenges and Case Study. CoRR abs/1801.10391 (2018) - [i43]Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac:
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks. CoRR abs/1802.00324 (2018) - [i42]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Hierarchical Aggregation Approach for Distributed clustering of spatial datasets. CoRR abs/1802.00688 (2018) - 2017
- [j9]Luuc Van Der Horst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core. IEEE Access 5: 22385-22398 (2017) - [j8]Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac:
One-Class Collective Anomaly Detection Based on LSTM-RNNs. T. Large-Scale Data- and Knowledge-Centered Systems 36: 73-85 (2017) - [c41]Thien-An Nguyen, Nhien-An Le-Khac, M. Tahar Kechadi:
Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems. FDSE 2017: 335-350 - [c40]Daniel Jacobs, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Volkswagen Car Entertainment System Forensics. TrustCom/BigDataSE/ICESS 2017: 699-705 - [c39]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data Within Digital Evidence. TrustCom/BigDataSE/ICESS 2017: 737-744 - [c38]Wybren van der Meer, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers. TrustCom/BigDataSE/ICESS 2017: 1076-1081 - [i41]Loïc Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac:
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network. CoRR abs/1703.09752 (2017) - [i40]Nhien-An Le-Khac, M. Tahar Kechadi, Joe Carthy:
Admire framework: Distributed data mining on data grid platforms. CoRR abs/1703.09756 (2017) - [i39]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Grid-based Approaches for Distributed Data Mining Applications. CoRR abs/1703.09807 (2017) - [i38]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Variance-based Clustering Technique for Distributed Data Mining Applications. CoRR abs/1703.09823 (2017) - [i37]Lionel Prat, Nhien-An Le-Khac, Cheryl Baker:
MapExif: an image scanning and mapping tool for investigators. CoRR abs/1703.09827 (2017) - [i36]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Efficient Large Scale Clustering based on data partitioning. CoRR abs/1704.03421 (2017) - [i35]Almar Tillekens, Nhien-An Le-Khac, Thanh-Thoa Pham-Thi:
A Bespoke Forensics GIS Tool. CoRR abs/1704.03452 (2017) - [i34]Van Loi Cao, Nhien-An Le-Khac, Miguel Nicolau, Michael O'Neill, James McDermott:
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Datasets. CoRR abs/1704.03522 (2017) - [i33]Nhien-An Le-Khac, Mark Roeloffs, M. Tahar Kechadi:
Forensic Analysis of TomTom Navigation Application. CoRR abs/1704.03524 (2017) - [i32]V.-H. Cao, K.-X. Chu, Nhien-An Le-Khac, M. Tahar Kechadi, Debra F. Laefer, Linh Truong-Hong:
Toward a new approach for massive LiDAR data processing. CoRR abs/1704.03527 (2017) - [i31]Nhien-An Le-Khac, M. Tahar Kechadi, Bo Wu, C. Chen:
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification. CoRR abs/1704.03530 (2017) - [i30]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
Toward a Distributed Knowledge Discovery system for Grid systems. CoRR abs/1704.03538 (2017) - [i29]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Tree-based Approach for Detecting Redundant Business Rules in very Large Financial Datasets. CoRR abs/1704.04301 (2017) - [i28]Nhien-An Le-Khac, M. Tahar Kechadi:
On a Distributed Approach for Density-based Clustering. CoRR abs/1704.04302 (2017) - [i27]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data within Digital Evidence. CoRR abs/1708.01728 (2017) - [i26]Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon:
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. CoRR abs/1708.01730 (2017) - [i25]Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon:
Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification. CoRR abs/1708.01731 (2017) - [i24]Alan Reed, Mark Scanlon, Nhien-An Le-Khac:
Forensic Analysis of Epic Privacy Browser on Windows Operating Systems. CoRR abs/1708.01732 (2017) - [i23]Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M. Tahar Kechadi:
Investigation and Automating Extraction of Thumbnails Produced by Image viewers. CoRR abs/1708.09051 (2017) - [i22]Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M. Tahar Kechadi:
Increasing digital investigator availability through efficient workflow management and automation. CoRR abs/1708.09053 (2017) - [i21]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Distributed Spatial Data Clustering as a New Approach for Big Data Analysis. CoRR abs/1710.09593 (2017) - [i20]Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac:
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar. CoRR abs/1710.09598 (2017) - [i19]Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic. CoRR abs/1712.05727 (2017) - 2016
- [j7]Maarten van Banerveld, Mohand Tahar Kechadi, Nhien-An Le-Khac:
A Natural Language Processing Tool for White Collar Crime Investigation. Trans. Large-Scale Data- and Knowledge-Centered Systems 23: 1-22 (2016) - [c37]Steven Ryder, Nhien-An Le-Khac:
The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt. CLOUD 2016: 904-907 - [c36]Malika Bendechache, M. Tahar Kechadi, Nhien-An Le-Khac:
Efficient Large Scale Clustering Based on Data Partitioning. DSAA 2016: 612-621 - [c35]Van Loi Cao, Nhien-An Le-Khac, Michael O'Neill, Miguel Nicolau, James McDermott:
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data. EvoApplications (1) 2016: 35-45 - [c34]Loïc Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac:
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks. FDSE 2016: 141-152 - [c33]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets. ICDM Workshops 2016: 1098-1103 - [c32]Isaac Cushman, Lei Chen, Danda B. Rawat, Nhien-An Le-Khac:
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy. MobiMedia 2016: 184-189 - [i18]Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon:
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists. CoRR abs/1604.03844 (2016) - [i17]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Data Reduction in Very Large Spatio-Temporal Data Sets. CoRR abs/1609.00988 (2016) - [i16]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A data mining-based solution for detecting suspicious money laundering cases in an investment bank. CoRR abs/1609.00990 (2016) - [i15]Maarten van Banerveld, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation. CoRR abs/1609.00992 (2016) - [i14]Nhien-An Le-Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon, M. Tahar Kechadi:
An efficient customer search tool within an Anti-Money Laundering application implemented on an international bank's dataset. CoRR abs/1609.02031 (2016) - [i13]Andree Linke, Nhien-An Le-Khac:
Control Flow Change in Assembly as a Classifier in Malware Analysis. CoRR abs/1609.02947 (2016) - [i12]Rob Witteman, Arjen Meijer, M. Tahar Kechadi, Nhien-An Le-Khac:
Toward a new tool to extract the Evidence from a Memory Card of Mobile phones. CoRR abs/1609.02953 (2016) - [i11]Robert van Voorst, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition of IMVU: A Case Study. CoRR abs/1609.02954 (2016) - [i10]Bert Busstra, Nhien-An Le-Khac, M. Tahar Kechadi:
Android and Wireless data-extraction using Wi-Fi. CoRR abs/1609.02966 (2016) - [i9]Fan Cai, Nhien-An Le-Khac, M. Tahar Kechadi:
An Integrated Classification Model for Financial Data Mining. CoRR abs/1609.02976 (2016) - [i8]Steven Ryder, Nhien-An Le-Khac:
The End of effective Law Enforcement in the Cloud? To encypt, or not to encrypt. CoRR abs/1609.07602 (2016) - [i7]Pieter Van Vliet, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics in Industrial Control System: A Case Study. CoRR abs/1611.01754 (2016) - [i6]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
Toward a new mobile cloud forensic framework. CoRR abs/1611.09564 (2016) - [i5]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. CoRR abs/1611.09566 (2016) - [i4]Christos Sgaras, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition and Analysis of instant messaging and VoIP applications. CoRR abs/1612.00204 (2016) - 2015
- [j6]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. IJDCF 7(2): 1-19 (2015) - [j5]Lionel Prat, Cheryl Baker, Nhien-An Le-Khac:
MapExif: An Image Scanning and Mapping Tool for Investigators. IJDCF 7(2): 53-78 (2015) - [j4]Robert van Voorst, Mohand Tahar Kechadi, Nhien-An Le-Khac:
Forensic Acquisition of IMVU: A Case Study. JDFSL 10(4): 69-78 (2015) - [c31]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps. ARES 2015: 249-257 - [c30]Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi:
Overview of the Forensic Investigation of Cloud Services. ARES 2015: 556-565 - [c29]Pieter Van Vliet, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics in Industrial Control System: A Case Study. CyberICS/WOS-CPS@ESORICS 2015: 147-156 - [c28]V.-H. Cao, K.-X. Chu, Nhien-An Le-Khac, M. Tahar Kechadi, Debra F. Laefer, Linh Truong-Hong:
Toward a new approach for massive LiDAR data processing. ICSDM 2015: 135-140 - [i3]Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, M. Tahar Kechadi:
HTML5 Zero Configuration Covert Channels: Security Risks and Challenges. CoRR abs/1510.00661 (2015) - [i2]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. CoRR abs/1510.00664 (2015) - 2014
- [j3]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync. JDFSL 9(2): 85-100 (2014) - [c27]Maarten van Banerveld, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation. FDSE 2014: 29-43 - [c26]Nhien-An Le-Khac, Mark Roeloffs, M. Tahar Kechadi:
Forensic Analysis of the TomTom Navigation Application. IFIP Int. Conf. Digital Forensics 2014: 267-276 - [c25]Christos Sgaras, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications. IWCF 2014: 188-199 - [i1]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync. CoRR abs/1409.8486 (2014) - 2013
- [c24]NhienAn LeKhac, Bo Wu, Chongcheng Chen, Mohand Tahar Kechadi:
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification. ICCSA (2) 2013: 623-634 - 2012
- [j2]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets. IJBIR 3(4): 1-13 (2012) - [c23]Fan Cai, Nhien-An Le-Khac, M. Tahar Kechadi:
Toward a new classification model for analysing financial datasets. ICDIM 2012: 1-6 - [c22]Lamine M. Aouad, M. Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac:
An Open Framework for Smartphone Evidence Acquisition. IFIP Int. Conf. Digital Forensics 2012: 159-166 - [c21]Fan Cai, NhienAn LeKhac, M. Tahar Kechadi:
An Integrated Model for Financial Data Mining. MIWAI 2012: 306-317 - 2011
- [c20]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
A New Hybrid Clustering Method for Reducing Very Large Spatio-temporal Dataset. ADMA (1) 2011: 69-82 - [c19]Nhien-An Le-Khac, M. Tahar Kechadi:
On a Distributed Approach for Density-Based Clustering. ICMLA (1) 2011: 283-286 - [c18]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Comparing two density-based clustering methods for reducing very large spatio-temporal dataset. ICSDM 2011: 519-524 - [c17]Jean-Francois Laloux, Nhien-An Le-Khac, M. Tahar Kechadi:
Efficient Distributed Approach for Density-Based Clustering. WETICE 2011: 145-150 - 2010
- [j1]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance study of distributed Apriori-like frequent itemsets mining. Knowl. Inf. Syst. 23(1): 55-72 (2010) - [c16]Nhien-An Le-Khac, Martin Bue, Michael Whelan, M. Tahar Kechadi:
A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. ADMA (2) 2010: 43-54 - [c15]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank. DBKDA 2010: 235-240 - [c14]Nhien-An Le-Khac, M. Tahar Kechadi:
Application of Data Mining for Anti-money Laundering Detection: A Case Study. ICDM Workshops 2010: 577-584 - [c13]Nhien-An Le-Khac, Sammer Markos, Mohand Tahar Kechadi:
Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank. IKE 2010: 57-63 - [c12]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Data Reduction in Very Large Spatio-Temporal Datasets. WETICE 2010: 104-109
2000 – 2009
- 2009
- [c11]Nhien-An Le-Khac, Sammer Markos, Mohand Tahar Kechadi:
Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank. ICDF2C 2009: 77-84 - [c10]Nhien-An Le-Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon, M. Tahar Kechadi:
An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset. IKE 2009: 151-157 - 2008
- [c9]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Persistent Workflow on the Grid. APSCC 2008: 8-14 - [c8]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems. ICMLA 2008: 839-842 - 2007
- [c7]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
A New Approach for Distributed Density Based Clustering on Grid Platform. BNCOD 2007: 247-258 - [c6]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Variance-based Clustering Technique for Distributed Data Mining Applications. DMIN 2007: 111-117 - [c5]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
An efficient support management tool for distributed data mining environments. ICDIM 2007: 272-278 - [c4]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Lightweight Clustering Technique for Distributed Data Mining Applications. Industrial Conference on Data Mining 2007: 120-134 - 2006
- [c3]Nhien-An Le-Khac, M. Tahar Kechadi, Joe Carthy:
Admire framework: Distributed data mining on data grid platforms. ICSOFT (2) 2006: 67-72 - [c2]Nhien-An Le-Khac:
Studying the Performance of Overlapping Communication and Computation by Active Message: INUKTITUT Case. Parallel and Distributed Computing and Networks 2006: 256-261 - 2005
- [c1]Nhien-An Le-Khac, Euloge Edi:
Performance Evaluation of INUKTITUT: An Efficient Interface for Asynchronous Parallel Programming Environment Athapascan. IASTED PDCS 2005: 157-162
Coauthor Index
M. Tahar Kechadi
aka: Mohand Tahar Kechadi
aka: Mohand Tahar Kechadi
[i44] [i42] [c41] [c40] [c38] [i40] [i39] [i38] [i36] [i33] [i32] [i31] [i30] [i29] [i28] [i23] [i22] [i21] [j7] [c36] [c33] [i17] [i16] [i15] [i14] [i12] [i11] [i10] [i9] [i7] [i6] [i5] [i4] [j6] [j4] [c30] [c29] [c28] [i3] [j3] [c27] [c26] [c25] [i1] [c24] [j2] [c23] [c22] [c21] [c20] [c19] [c18] [c17] [j1] [c16] [c15] [c14] [c13] [c12] [c11] [c10] [c9] [c8] [c7] [c6] [c5] [c4] [c3]
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-05 21:31 CEST by the dblp team