default search action
Nhien-An Le-Khac
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j56]Hong-Hanh Nguyen-Le, Lam Tran, Dinh Song An Nguyen, Nhien-An Le-Khac, Thuc Nguyen:
Privacy-preserving speaker verification system using Ranking-of-Element hashing. Pattern Recognit. 159: 111107 (2025) - 2024
- [j55]Lojenaa Navanesan, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara:
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics. Forensic Sci. Int. Digit. Investig. 48: 301684 (2024) - [j54]Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
The next phase of identifying illicit activity in Bitcoin. Int. J. Netw. Manag. 34(5) (2024) - [j53]Lojenaa Navanesan, Nhien-An Le-Khac, Yossi Oren, Kasun De Zoysa, Asanka P. Sayakkara:
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics. J. Univers. Comput. Sci. 30(10): 1389-1422 (2024) - [j52]Hung Q. Ngo, Hien D. Nguyen, Nhien-An Le-Khac:
Ontology Knowledge Map Approach Towards Building Linked Data for Vietnamese Legal Applications. Vietnam. J. Comput. Sci. 11(2): 323-342 (2024) - [j51]Duc-Anh Nguyen, Cuong Pham, Rob Argent, Brian Caulfield, Nhien-An Le-Khac:
Model and Empirical Study on Multi-tasking Learning for Human Fall Detection. Vietnam. J. Comput. Sci. 11(3): 363-376 (2024) - 2023
- [j50]Hung Q. Ngo, Nhien-An Le-Khac:
Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics. Forensic Sci. Int. Digit. Investig. 47: 301621 (2023) - [j49]Ole Halvar Larsen, Hung Q. Ngo, Nhien-An Le-Khac:
A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training. Forensic Sci. Int. Digit. Investig. 47: 301622 (2023) - 2022
- [j48]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
Knowledge representation in digital agriculture: A step towards standardised model. Comput. Electron. Agric. 199: 107127 (2022) - [j47]Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
An efficient IoT forensic approach for the evidence acquisition and analysis based on network link. Log. J. IGPL 30(6): 1041-1055 (2022) - [j46]Chamin Nalinda Lokugam Hewage, Debra F. Laefer, Anh-Vu Vo, Nhien-An Le-Khac, Michela Bertolotto:
Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review. Remote. Sens. 14(20): 5277 (2022) - [j45]Mahmoud Said Elsayed, Nhien-An Le-Khac, Marianne A. Azer, Anca D. Jurcut:
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs. IEEE Trans. Cogn. Commun. Netw. 8(4): 1862-1880 (2022) - 2021
- [j44]Asanka P. Sayakkara, Nhien-An Le-Khac:
Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis. IEEE Access 9: 13237-13247 (2021) - [j43]Asanka P. Sayakkara, Nhien-An Le-Khac:
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets. IEEE Access 9: 113585-113598 (2021) - [j42]Quoc Hung Ngo, Mohand Tahar Kechadi, Nhien-An Le-Khac:
Domain Specific Entity Recognition With Semantic-Based Deep Learning Approach. IEEE Access 9: 152892-152902 (2021) - [j41]Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape. IEEE Access 9: 163965-163986 (2021) - [j40]Michael R. Jennings, Colin Turner, Raymond R. Bond, Alan Kennedy, Ranul Deelaka Thantilage, Mohand Tahar Kechadi, Nhien-An Le-Khac, James McLaughlin, Dewar D. Finlay:
Code-free cloud computing service to facilitate rapid biomedical digital signal processing and algorithm development. Comput. Methods Programs Biomed. 211: 106398 (2021) - [j39]Guido Cornelis Schipper, Rudy Seelt, Nhien-An Le-Khac:
Forensic analysis of Matrix protocol and Riot.im application. Digit. Investig. 36 Supplement: 301118 (2021) - [j38]Felix Anda, Edward Dixon, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Vec2UAge: Enhancing underage age estimation performance through facial embeddings. Digit. Investig. 36 Supplement: 301119 (2021) - [j37]Joachim Sester, Darren R. Hayes, Mark Scanlon, Nhien-An Le-Khac:
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis. Digit. Investig. 36 Supplement: 301121 (2021) - [j36]Cezar Serhal, Nhien-An Le-Khac:
Machine learning based approach to analyze file meta data for smart phone file triage. Digit. Investig. 37 Supplement: 301194 (2021) - [j35]Quan Le, Luis Miralles-Pechuán, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis. Digit. Investig. 39: 301308 (2021) - [j34]Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca Delia Jurcut:
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]. IEEE Secur. Priv. 19(1): 90-94 (2021) - [j33]Vuong M. Ngo, Sven Helmer, Nhien-An Le-Khac, M. Tahar Kechadi:
Structural textile pattern recognition and processing based on hypergraphs. Inf. Retr. J. 24(2): 137-173 (2021) - [j32]Mahmoud Said Elsayed, Nhien-An Le-Khac, Marwan Ali Albahar, Anca Jurcut:
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191: 103160 (2021) - [j31]Aditya Kuppa, Nhien-An Le-Khac:
Adversarial XAI Methods in Cybersecurity. IEEE Trans. Inf. Forensics Secur. 16: 4924-4938 (2021) - 2020
- [j30]Mahmoud Said Elsayed, Nhien-An Le-Khac, Anca D. Jurcut:
InSDN: A Novel SDN Intrusion Dataset. IEEE Access 8: 165263-165284 (2020) - [j29]Ngoc Hong Tran, Nhien-An Le-Khac, M. Tahar Kechadi:
Lightweight privacy-Preserving data classification. Comput. Secur. 97: 101835 (2020) - [j28]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis. Digit. Investig. 32 Supplement: 300907 (2020) - [j27]Felix Anda, Nhien-An Le-Khac, Mark Scanlon:
DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation. Digit. Investig. 32 Supplement: 300921 (2020) - [j26]Asanka P. Sayakkara, Luis Miralles-Pechuán, Nhien-An Le-Khac, Mark Scanlon:
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection. Digit. Investig. 32 Supplement: 300927 (2020) - [j25]Wiebe Koerhuis, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensic analysis of privacy-oriented cryptocurrencies. Digit. Investig. 33: 200891 (2020) - [j24]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework. Digit. Investig. 33 Supplement: 301003 (2020) - [j23]Nhien-An Le-Khac, Daniel Jacobs, John Nijhoff, Karsten Bertens, Kim-Kwang Raymond Choo:
Smart vehicle forensics: Challenges and case study. Future Gener. Comput. Syst. 109: 500-510 (2020) - [j22]Vuong M. Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Data warehouse and decision support on integrated crop big data. Int. J. Bus. Process. Integr. Manag. 10(1): 17-28 (2020) - [j21]Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac:
Security Considerations for Internet of Things: A Survey. SN Comput. Sci. 1(4): 193 (2020) - 2019
- [j20]Khoi Khac Nguyen, Trung Quang Duong, Ngo Anh Vien, Nhien-An Le-Khac, Minh-Nghia Nguyen:
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Access 7: 100480-100490 (2019) - [j19]Stephan Zollner, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems. IEEE Access 7: 158250-158263 (2019) - [j18]Khoi Khac Nguyen, Trung Q. Duong, Ngo Anh Vien, Nhien-An Le-Khac, Long Dinh Nguyen:
Distributed Deep Deterministic Policy Gradient for Power Allocation Control in D2D-Based V2V Communications. IEEE Access 7: 164533-164543 (2019) - [j17]Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac:
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. Digit. Investig. 28 Supplement: S105-S115 (2019) - [j16]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving the accuracy of automated facial age estimation to aid CSEM investigations. Digit. Investig. 28 Supplement: S142 (2019) - [j15]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics. Digit. Investig. 29: 43-54 (2019) - [j14]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. Digit. Investig. 29 Supplement: S94-S103 (2019) - 2018
- [j13]Jacques Boucher, Nhien-An Le-Khac:
Forensic framework to identify local vs synced artefacts. Digit. Investig. 24 Supplement: S68-S75 (2018) - [j12]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. Digit. Investig. 26 Supplement: S77-S86 (2018) - 2017
- [j11]Luuc Van Der Horst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core. IEEE Access 5: 22385-22398 (2017) - [j10]Patrick Tobin, Nhien-An Le-Khac, M. Tahar Kechadi:
Forensic Analysis of Virtual Hard Drives. J. Digit. Forensics Secur. Law 12(1): 47-58 (2017) - [j9]Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac:
One-Class Collective Anomaly Detection Based on LSTM-RNNs. Trans. Large Scale Data Knowl. Centered Syst. 36: 73-85 (2017) - 2016
- [j8]Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon:
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists. Digit. Investig. 16 Supplement: S75-S85 (2016) - [j7]Maarten van Banerveld, Mohand Tahar Kechadi, Nhien-An Le-Khac:
A Natural Language Processing Tool for White Collar Crime Investigation. Trans. Large Scale Data Knowl. Centered Syst. 23: 1-22 (2016) - 2015
- [j6]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. Int. J. Digit. Crime Forensics 7(2): 1-19 (2015) - [j5]Lionel Prat, Cheryl Baker, Nhien-An Le-Khac:
MapExif: An Image Scanning and Mapping Tool for Investigators. Int. J. Digit. Crime Forensics 7(2): 53-78 (2015) - [j4]Robert van Voorst, Mohand Tahar Kechadi, Nhien-An Le-Khac:
Forensic Acquisition of IMVU: A Case Study. J. Digit. Forensics Secur. Law 10(4): 69-78 (2015) - 2014
- [j3]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync. J. Digit. Forensics Secur. Law 9(2): 85-100 (2014) - 2012
- [j2]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets. Int. J. Bus. Intell. Res. 3(4): 1-13 (2012) - 2010
- [j1]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance study of distributed Apriori-like frequent itemsets mining. Knowl. Inf. Syst. 23(1): 55-72 (2010)
Conference and Workshop Papers
- 2024
- [c94]Duc-Anh Nguyen, Nhien-An Le-Khac:
SoK: Behind the Accuracy of Complex Human Activity Recognition Using Deep Learning. IJCNN 2024: 1-8 - [c93]Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen, Nhien-An Le-Khac:
D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack. IJCNN 2024: 1-8 - [c92]Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac:
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. SEC 2024: 451-464 - [c91]Aditya Kuppa, Jack Nicholls, Nhien-An Le-Khac:
Manipulating Prompts and Retrieval-Augmented Generation for LLM Service Providers. SECRYPT 2024: 777-785 - 2023
- [c90]Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification. ACSAC 2023: 324-336 - [c89]Dinh Hoang Nguyen, Nam Khanh Tran, Nhien-An Le-Khac:
A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks. FDSE 2023: 199-211 - [c88]Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
SoK: The Next Phase of Identifying Illicit Activity in Bitcoin. ICBC 2023: 1-10 - [c87]Paul Stenzel, Nhien-An Le-Khac:
Identify Users on Dating Applications: A Forensic Perspective. ICDF2C (1) 2023: 58-77 - [c86]Bart Somers, Asanka P. Sayakkara, Darren R. Hayes, Nhien-An Le-Khac:
Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning. ICDF2C (1) 2023: 227-248 - [c85]Trevor Nicholson, Darren R. Hayes, Nhien-An Le-Khac:
Forensic Analysis of the iOS Apple Pay Mobile Payment System. IFIP Int. Conf. Digital Forensics 2023: 3-19 - [c84]Chi Duc Luu, Van Quan Nguyen, Truong Son Pham, Nhien-An Le-Khac:
A Zero-Shot Deep Learning Approach for Unknown IoT Botnet Attack Detection. RIVF 2023: 278-283 - 2022
- [c83]Chamin Nalinda Lokugam Hewage, Debra F. Laefer, Michela Bertolotto, Anh-Vu Vo, Nhien-An Le-Khac:
DACMA: Designing space ordering optimizations to scalably manage aerial images. IEEE Big Data 2022: 4916-4925 - [c82]Ranul Deelaka Thantilage, Nhien-An Le-Khac, M. Tahar Kechadi:
Towards a Privacy, Secured and Distributed Clinical Data Warehouse Architecture. FDSE (CCIS Volume) 2022: 73-87 - [c81]Chamin Nalinda Lokugam Hewage, Anh-Vu Vo, Nhien-An Le-Khac, Debra F. Laefer, Michela Bertolotto:
4DHI: An index for approximate kNN search of remotely sensed images in Key-Value databases. IC2E 2022: 170-181 - [c80]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
OAK4XAI: Model Towards Out-of-Box eXplainable Artificial Intelligence for Digital Agriculture. SGAI Conf. 2022: 238-251 - 2021
- [c79]Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac:
Linking CVE's to MITRE ATT&CK Techniques. ARES 2021: 21:1-21:12 - [c78]Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut:
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. ARES 2021: 34:1-34:7 - [c77]Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac:
Towards Improving Privacy of Synthetic DataSets. APF 2021: 106-119 - [c76]Richard Buurke, Nhien-An Le-Khac:
Accessing Secure Data on Android Through Application Analysis. ICDF2C 2021: 93-108 - [c75]Van Quan Nguyen, Viet Hung Nguyen, Nhien-An Le-Khac, Van Loi Cao:
Automatically Estimate Clusters in Autoencoder-based Clustering Model for Anomaly Detection. RIVF 2021: 1-6 - 2020
- [c74]Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. ARES 2020: 46:1-46:10 - [c73]Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac:
Effect of Security Controls on Patching Window: A Causal Inference based Approach. ACSAC 2020: 556-566 - [c72]Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment. CISIS 2020: 163-173 - [c71]Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. Cyber Security 2020: 1-8 - [c70]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
OAK: Ontology-Based Knowledge Map Model for Digital Agriculture. FDSE 2020: 245-259 - [c69]Van Quan Nguyen, Viet Hung Nguyen, Nhien-An Le-Khac, Van Loi Cao:
Clustering-Based Deep Autoencoders for Network Anomaly Detection. FDSE 2020: 290-303 - [c68]Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac:
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. ICDF2C 2020: 231-236 - [c67]Ranul Deelaka Thantilage, Nhien-An Le-Khac:
Retrieving E-Dating Application Artifacts from iPhone Backups. IFIP Int. Conf. Digital Forensics 2020: 215-230 - [c66]Aditya Kuppa, Nhien-An Le-Khac:
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security. IJCNN 2020: 1-8 - [c65]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. ISNCC 2020: 1-7 - [c64]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Network Anomaly Detection Using LSTM Based Autoencoder. Q2SWinet 2020: 37-45 - [c63]Manaz Kaleel, Nhien-An Le-Khac:
Towards a new deep learning based approach for the password prediction. TrustCom 2020: 1146-1150 - [c62]Rick Cents, Nhien-An Le-Khac:
Towards A New Approach to Identify WhatsApp Messages. TrustCom 2020: 1895-1902 - [c61]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. WoWMoM 2020: 391-396 - 2019
- [c60]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Black Box Attacks on Deep Anomaly Detectors. ARES 2019: 21:1-21:10 - [c59]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. ARES 2019: 57:1-57:8 - [c58]Vuong M. Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Designing and Implementing Data Warehouse for Agricultural Big Data. BigData 2019: 1-17 - [c57]Anh-Vu Vo, Chamin Nalinda Lokugam Hewage, Gianmarco Russo, Neel Chauhan, Debra F. Laefer, Michela Bertolotto, Nhien-An Le-Khac, Ulrich Ofterdinger:
Efficient LiDAR point cloud data encoding for scalable data management within the Hadoop eco-system. IEEE BigData 2019: 5644-5653 - [c56]Lars Diederichsen, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Graph Database-Based Approach to Analyze Network Log Files. NSS 2019: 53-73 - [c55]Quoc Hung Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Predicting Soil pH by Using Nearest Fields. SGAI Conf. 2019: 480-486 - [c54]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. TrustCom/BigDataSE 2019: 442-449 - [c53]Ranul Deelaka Thantilage, Nhien-An Le-Khac:
Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory. TrustCom/BigDataSE 2019: 476-482 - 2018
- [c52]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. ARES 2018: 15:1-15:9 - [c51]John Vieyra, Mark Scanlon, Nhien-An Le-Khac:
Solid State Drive Forensics: Where Do We Stand? ICDF2C 2018: 149-164 - [c50]K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac:
RiskWriter: Predicting Cyber Risk of an Enterprise. ICISS 2018: 88-106 - [c49]Saad Alabdulsalam, Kevin Schaefer, M. Tahar Kechadi, Nhien-An Le-Khac:
Internet of Things Forensics - Challenges and a Case Study. IFIP Int. Conf. Digital Forensics 2018: 35-48 - [c48]Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic. IFIP Int. Conf. Digital Forensics 2018: 183-197 - [c47]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis. ISSTA/ECOOP Workshops 2018: 138-143 - [c46]Quoc Hung Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Ontology Based Approach for Precision Agriculture. MIWAI 2018: 175-186 - [c45]Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 129-139 - [c44]K. Aditya, Slawomir Grzonkowski, Nhien An LeKhac:
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study. TrustCom/BigDataSE 2018: 1250-1255 - [c43]Arnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
A Forensic Investigation Framework for Smart Home Environment. TrustCom/BigDataSE 2018: 1446-1451 - 2017
- [c42]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets. AusDM 2017: 38-56 - [c41]Thien-An Nguyen, Nhien-An Le-Khac, M. Tahar Kechadi:
Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems. FDSE 2017: 335-350 - [c40]Daniel Jacobs, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Volkswagen Car Entertainment System Forensics. TrustCom/BigDataSE/ICESS 2017: 699-705 - [c39]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data Within Digital Evidence. TrustCom/BigDataSE/ICESS 2017: 737-744 - [c38]Wybren van der Meer, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac:
Investigation and Automating Extraction of Thumbnails Produced by Image Viewers. TrustCom/BigDataSE/ICESS 2017: 1076-1081 - 2016
- [c37]Steven Ryder, Nhien-An Le-Khac:
The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt. CLOUD 2016: 904-907 - [c36]Malika Bendechache, M. Tahar Kechadi, Nhien-An Le-Khac:
Efficient Large Scale Clustering Based on Data Partitioning. DSAA 2016: 612-621 - [c35]Van Loi Cao, Nhien-An Le-Khac, Michael O'Neill, Miguel Nicolau, James McDermott:
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data. EvoApplications (1) 2016: 35-45 - [c34]Loïc Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac:
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks. FDSE 2016: 141-152 - [c33]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets. ICDM Workshops 2016: 1098-1103 - [c32]Isaac Cushman, Lei Chen, Danda B. Rawat, Nhien-An Le-Khac:
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy. MobiMedia 2016: 184-189 - 2015
- [c31]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps. ARES 2015: 249-257 - [c30]Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi:
Overview of the Forensic Investigation of Cloud Services. ARES 2015: 556-565 - [c29]Pieter Van Vliet, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics in Industrial Control System: A Case Study. CyberICS/WOS-CPS@ESORICS 2015: 147-156 - [c28]Van-Hung Cao, Khoi-Xuan Chu, Nhien-An Le-Khac, M. Tahar Kechadi, Debra F. Laefer, Linh Truong-Hong:
Toward a new approach for massive LiDAR data processing. ICSDM 2015: 135-140 - 2014
- [c27]Maarten van Banerveld, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation. FDSE 2014: 29-43 - [c26]Nhien-An Le-Khac, Mark Roeloffs, M. Tahar Kechadi:
Forensic Analysis of the TomTom Navigation Application. IFIP Int. Conf. Digital Forensics 2014: 267-276 - [c25]Christos Sgaras, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications. IWCF 2014: 188-199 - 2013
- [c24]NhienAn LeKhac, Bo Wu, Chongcheng Chen, Mohand Tahar Kechadi:
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification. ICCSA (2) 2013: 623-634 - 2012
- [c23]Fan Cai, Nhien-An Le-Khac, M. Tahar Kechadi:
Toward a new classification model for analysing financial datasets. ICDIM 2012: 1-6 - [c22]Lamine M. Aouad, M. Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac:
An Open Framework for Smartphone Evidence Acquisition. IFIP Int. Conf. Digital Forensics 2012: 159-166 - [c21]Fan Cai, NhienAn LeKhac, M. Tahar Kechadi:
An Integrated Model for Financial Data Mining. MIWAI 2012: 306-317 - 2011
- [c20]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
A New Hybrid Clustering Method for Reducing Very Large Spatio-temporal Dataset. ADMA (1) 2011: 69-82 - [c19]Nhien-An Le-Khac, M. Tahar Kechadi:
On a Distributed Approach for Density-Based Clustering. ICMLA (1) 2011: 283-286 - [c18]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Comparing two density-based clustering methods for reducing very large spatio-temporal dataset. ICSDM 2011: 519-524 - [c17]Jean-Francois Laloux, Nhien-An Le-Khac, M. Tahar Kechadi:
Efficient Distributed Approach for Density-Based Clustering. WETICE 2011: 145-150 - 2010
- [c16]Nhien-An Le-Khac, Martin Bue, Michael Whelan, M. Tahar Kechadi:
A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets. ADMA (2) 2010: 43-54 - [c15]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank. DBKDA 2010: 235-240 - [c14]Nhien-An Le-Khac, M. Tahar Kechadi:
Application of Data Mining for Anti-money Laundering Detection: A Case Study. ICDM Workshops 2010: 577-584 - [c13]Nhien-An Le-Khac, Sammer Markos, Mohand Tahar Kechadi:
Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank. IKE 2010: 57-63 - [c12]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Data Reduction in Very Large Spatio-Temporal Datasets. WETICE 2010: 104-109 - 2009
- [c11]Nhien-An Le-Khac, Sammer Markos, Mohand Tahar Kechadi:
Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank. ICDF2C 2009: 77-84 - [c10]Nhien-An Le-Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon, M. Tahar Kechadi:
An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset. IKE 2009: 151-157 - 2008
- [c9]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Persistent Workflow on the Grid. APSCC 2008: 8-14 - [c8]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems. ICMLA 2008: 839-842 - 2007
- [c7]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
A New Approach for Distributed Density Based Clustering on Grid Platform. BNCOD 2007: 247-258 - [c6]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Variance-based Clustering Technique for Distributed Data Mining Applications. DMIN 2007: 111-117 - [c5]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
An efficient support management tool for distributed data mining environments. ICDIM 2007: 272-278 - [c4]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Lightweight Clustering Technique for Distributed Data Mining Applications. ICDM 2007: 120-134 - 2006
- [c3]Nhien-An Le-Khac, M. Tahar Kechadi, Joe Carthy:
Admire framework: Distributed data mining on data grid platforms. ICSOFT (2) 2006: 67-72 - [c2]Nhien-An Le-Khac:
Studying the Performance of Overlapping Communication and Computation by Active Message: INUKTITUT Case. Parallel and Distributed Computing and Networks 2006: 256-261 - 2005
- [c1]Nhien-An Le-Khac, Euloge Edi:
Performance Evaluation of INUKTITUT: An Efficient Interface for Asynchronous Parallel Programming Environment Athapascan. IASTED PDCS 2005: 157-162
Parts in Books or Collections
- 2020
- [p13]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors. Cyber and Digital Forensic Investigations 2020: 1-4 - [p12]William O'Sullivan, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Defending IoT Devices from Malware. Cyber and Digital Forensic Investigations 2020: 5-29 - [p11]Alexander Hilgenberg, Trung Q. Duong, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies. Cyber and Digital Forensic Investigations 2020: 31-49 - [p10]Cian Young, Robert McArdle, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Forensic Investigation of Ransomware Activities - Part 1. Cyber and Digital Forensic Investigations 2020: 51-77 - [p9]Christopher Boyton, Nhien-An Le-Khac, Kim-Kwang Raymond Choo, Anca Jurcut:
Forensic Investigation of Ransomware Activities - Part 2. Cyber and Digital Forensic Investigations 2020: 79-108 - [p8]Richard Gomm, Ryan Brooks, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, Kien Wooi Hew:
CCTV Forensics in the Big Data Era: Challenges and Approaches. Cyber and Digital Forensic Investigations 2020: 109-139 - [p7]Lars Standare, Darren R. Hayes, Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Forensic Investigation of PayPal Accounts. Cyber and Digital Forensic Investigations 2020: 141-174 - [p6]Sebastian Schlepphorst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital Forensic Approaches for Cloud Service Models: A Survey. Cyber and Digital Forensic Investigations 2020: 175-199 - [p5]Neil Redmond, Le-Nam Tran, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Long Term Evolution Network Security and Real-Time Data Extraction. Cyber and Digital Forensic Investigations 2020: 201-220 - [p4]Andrew Kinder, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Towards an Automated Process to Categorise Tor's Hidden Services. Cyber and Digital Forensic Investigations 2020: 221-246 - [p3]Cornelis Leendert van Veldhuizen, Madhusanka Liyanage, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
The Bitcoin-Network Protocol from a Forensic Perspective. Cyber and Digital Forensic Investigations 2020: 247-275 - [p2]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
So, What's Next? Cyber and Digital Forensic Investigations 2020: 277-278 - 2018
- [p1]Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac:
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar. Computer and Network Security Essentials 2018: 369-388
Editorship
- 2020
- [e1]Nhien-An Le-Khac, Kim-Kwang Raymond Choo:
Cyber and Digital Forensic Investigations, A Law Enforcement Practitioner's Perspective. Studies in Big Data 74, Springer 2020, ISBN 978-3-030-47130-9 [contents]
Informal and Other Publications
- 2024
- [i83]Duc-Anh Nguyen, Nhien-An Le-Khac:
SoK: Behind the Accuracy of Complex Human Activity Recognition Using Deep Learning. CoRR abs/2405.00712 (2024) - [i82]Hong-Hanh Nguyen-Le, Van-Tuan Tran, Dinh-Thuc Nguyen, Nhien-An Le-Khac:
D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack. CoRR abs/2409.07390 (2024) - 2023
- [i81]Tharindu Lakshan Yasarathna, Lojenaa Navanesan, Simon Barque, Asanka P. Sayakkara, Nhien-An Le-Khac:
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset. CoRR abs/2310.03119 (2023) - [i80]Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
Enhancing Illicit Activity Detection using XAI: A Multimodal Graph-LLM Framework. CoRR abs/2310.13787 (2023) - [i79]Duc-Anh Nguyen, Cuong Pham, Nhien-An Le-Khac:
Virtual Fusion with Contrastive Learning for Single Sensor-based Activity Recognition. CoRR abs/2312.02185 (2023) - [i78]Lojenaa Navanesan, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara:
Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis. CoRR abs/2312.11301 (2023) - 2022
- [i77]Eugene Chang, Paul D'Arcy, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications. CoRR abs/2205.14611 (2022) - [i76]Aditya Kuppa, Nhien-An Le-Khac:
Learn to Adapt: Robust Drift Detection in Security Domain. CoRR abs/2206.07581 (2022) - [i75]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
Knowledge Representation in Digital Agriculture: A Step Towards Standardised Model. CoRR abs/2207.07740 (2022) - [i74]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
OAK4XAI: Model towards Out-Of-Box eXplainable Artificial Intelligence for Digital Agriculture. CoRR abs/2209.15104 (2022) - 2021
- [i73]Guerrino Mazzarolo, Juan Carlos Fernandez Casas, Anca Delia Jurcut, Nhien-An Le-Khac:
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site. CoRR abs/2103.04744 (2021) - [i72]Vuong M. Ngo, Sven Helmer, Nhien-An Le-Khac, M. Tahar Kechadi:
Structural Textile Pattern Recognition and Processing Based on Hypergraphs. CoRR abs/2103.11271 (2021) - 2020
- [i71]Vuong M. Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Data Warehouse and Decision Support on Integrated Crop Big Data. CoRR abs/2003.04470 (2020) - [i70]Anca Jurcut, Tiberiu Niculcea, Pasika Ranaweera, Nhien-An Le-Khac:
Security Considerations for Internet of Things: A Survey. CoRR abs/2006.10591 (2020) - [i69]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. CoRR abs/2006.13981 (2020) - [i68]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Detecting Abnormal Traffic in Large-Scale Networks. CoRR abs/2008.05791 (2020) - [i67]Dennis Wijnberg, Nhien-An Le-Khac:
Identifying interception possibilities for WhatsApp communication. CoRR abs/2011.03732 (2020) - [i66]Quoc Hung Ngo, M. Tahar Kechadi, Nhien-An Le-Khac:
OAK: Ontology-Based Knowledge Map Model for Digital Agriculture. CoRR abs/2011.11442 (2020) - [i65]Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac:
Retracing the Flow of the Stream: Investigating Kodi Streaming Services. CoRR abs/2012.01107 (2020) - [i64]Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon:
Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation. CoRR abs/2012.01179 (2020) - [i63]Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation. CoRR abs/2012.01987 (2020) - 2019
- [i62]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance study of distributed Apriori-like frequent itemsets mining. CoRR abs/1903.03008 (2019) - [i61]Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac:
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS. CoRR abs/1903.07053 (2019) - [i60]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics. CoRR abs/1903.07703 (2019) - [i59]Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon:
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices. CoRR abs/1904.02089 (2019) - [i58]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. CoRR abs/1905.07273 (2019) - [i57]Vuong M. Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Designing and Implementing Data Warehouse for Agricultural Big Data. CoRR abs/1905.12411 (2019) - [i56]Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon:
Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. CoRR abs/1907.01427 (2019) - [i55]Ngoc Hong Tran, Thien-An Nguyen-Ngoc, Nhien-An Le-Khac, M. Tahar Kechadi:
A Security-Aware Access Model for Data-Driven EHR System. CoRR abs/1908.10229 (2019) - [i54]Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut:
Machine-Learning Techniques for Detecting Attacks in SDN. CoRR abs/1910.00817 (2019) - [i53]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
Knowledge Map: Toward a New Approach Supporting the Knowledge Management in Distributed Data Mining. CoRR abs/1910.10547 (2019) - [i52]Quoc Hung Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Predicting Soil pH by Using Nearest Fields. CoRR abs/1912.01303 (2019) - 2018
- [i51]Saad Alabdulsalam, Kevin Schaefer, M. Tahar Kechadi, Nhien-An Le-Khac:
Internet of things forensics: Challenges and Case Study. CoRR abs/1801.10391 (2018) - [i50]Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac:
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks. CoRR abs/1802.00324 (2018) - [i49]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Hierarchical Aggregation Approach for Distributed clustering of spatial datasets. CoRR abs/1802.00688 (2018) - [i48]Alan Roder, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study. CoRR abs/1804.08649 (2018) - [i47]Yves Vandermeer, Nhien-An Le-Khac, Joe Carthy, M. Tahar Kechadi:
Forensic Analysis of the exFAT artefacts. CoRR abs/1804.08653 (2018) - [i46]Vuong M. Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
An Efficient Data Warehouse for Crop Yield Prediction. CoRR abs/1807.00035 (2018) - [i45]Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac:
Digital forensic investigation of two-way radio communication equipment and services. CoRR abs/1807.08264 (2018) - [i44]K. Aditya, Slawomir Grzonkowski, Nhien An LeKhac:
Enabling Trust in Deep Learning Models: A Digital Forensics Case Study. CoRR abs/1808.01196 (2018) - [i43]Quoc Hung Ngo, Nhien-An Le-Khac, M. Tahar Kechadi:
Ontology based Approach for Precision Agriculture. CoRR abs/1811.06884 (2018) - 2017
- [i42]Loïc Bontemps, Van Loi Cao, James McDermott, Nhien-An Le-Khac:
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network. CoRR abs/1703.09752 (2017) - [i41]Nhien-An Le-Khac, M. Tahar Kechadi, Joe Carthy:
Admire framework: Distributed data mining on data grid platforms. CoRR abs/1703.09756 (2017) - [i40]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Grid-based Approaches for Distributed Data Mining Applications. CoRR abs/1703.09807 (2017) - [i39]Lamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi:
Variance-based Clustering Technique for Distributed Data Mining Applications. CoRR abs/1703.09823 (2017) - [i38]Lionel Prat, Nhien-An Le-Khac, Cheryl Baker:
MapExif: an image scanning and mapping tool for investigators. CoRR abs/1703.09827 (2017) - [i37]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Efficient Large Scale Clustering based on data partitioning. CoRR abs/1704.03421 (2017) - [i36]Almar Tillekens, Nhien-An Le-Khac, Thanh Thoa Pham Thi:
A Bespoke Forensics GIS Tool. CoRR abs/1704.03452 (2017) - [i35]Van Loi Cao, Nhien-An Le-Khac, Miguel Nicolau, Michael O'Neill, James McDermott:
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Datasets. CoRR abs/1704.03522 (2017) - [i34]Nhien-An Le-Khac, Mark Roeloffs, M. Tahar Kechadi:
Forensic Analysis of TomTom Navigation Application. CoRR abs/1704.03524 (2017) - [i33]Van-Hung Cao, Khoi-Xuan Chu, Nhien-An Le-Khac, M. Tahar Kechadi, Debra F. Laefer, Linh Truong-Hong:
Toward a new approach for massive LiDAR data processing. CoRR abs/1704.03527 (2017) - [i32]Nhien-An Le-Khac, M. Tahar Kechadi, Bo Wu, Chongcheng Chen:
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification. CoRR abs/1704.03530 (2017) - [i31]Nhien-An Le-Khac, Lamine M. Aouad, M. Tahar Kechadi:
Toward a Distributed Knowledge Discovery system for Grid systems. CoRR abs/1704.03538 (2017) - [i30]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A Tree-based Approach for Detecting Redundant Business Rules in very Large Financial Datasets. CoRR abs/1704.04301 (2017) - [i29]Nhien-An Le-Khac, M. Tahar Kechadi:
On a Distributed Approach for Density-based Clustering. CoRR abs/1704.04302 (2017) - [i28]Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac:
Privileged Data within Digital Evidence. CoRR abs/1708.01728 (2017) - [i27]Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon:
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service. CoRR abs/1708.01730 (2017) - [i26]Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon:
Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification. CoRR abs/1708.01731 (2017) - [i25]Alan Reed, Mark Scanlon, Nhien-An Le-Khac:
Forensic Analysis of Epic Privacy Browser on Windows Operating Systems. CoRR abs/1708.01732 (2017) - [i24]Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M. Tahar Kechadi:
Investigation and Automating Extraction of Thumbnails Produced by Image viewers. CoRR abs/1708.09051 (2017) - [i23]Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M. Tahar Kechadi:
Increasing digital investigator availability through efficient workflow management and automation. CoRR abs/1708.09053 (2017) - [i22]Malika Bendechache, Nhien-An Le-Khac, M. Tahar Kechadi:
Distributed Spatial Data Clustering as a New Approach for Big Data Analysis. CoRR abs/1710.09593 (2017) - [i21]Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac:
Privacy Preserving Internet Browsers: Forensic Analysis of Browzar. CoRR abs/1710.09598 (2017) - [i20]Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac:
Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic. CoRR abs/1712.05727 (2017) - 2016
- [i19]Marcel Maatkamp, Martin van Delden, Nhien An LeKhac:
Unidirectional Secure Information Transfer via RabbitMQ. CoRR abs/1602.07467 (2016) - [i18]Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon:
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists. CoRR abs/1604.03844 (2016) - [i17]Michael Whelan, Nhien-An Le-Khac, M. Tahar Kechadi:
Data Reduction in Very Large Spatio-Temporal Data Sets. CoRR abs/1609.00988 (2016) - [i16]Nhien-An Le-Khac, Sammer Markos, M. Tahar Kechadi:
A data mining-based solution for detecting suspicious money laundering cases in an investment bank. CoRR abs/1609.00990 (2016) - [i15]Maarten van Banerveld, Nhien-An Le-Khac, M. Tahar Kechadi:
Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation. CoRR abs/1609.00992 (2016) - [i14]Nhien-An Le-Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon, M. Tahar Kechadi:
An efficient customer search tool within an Anti-Money Laundering application implemented on an international bank's dataset. CoRR abs/1609.02031 (2016) - [i13]Andree Linke, Nhien-An Le-Khac:
Control Flow Change in Assembly as a Classifier in Malware Analysis. CoRR abs/1609.02947 (2016) - [i12]Rob Witteman, Arjen Meijer, M. Tahar Kechadi, Nhien-An Le-Khac:
Toward a new tool to extract the Evidence from a Memory Card of Mobile phones. CoRR abs/1609.02953 (2016) - [i11]Robert van Voorst, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition of IMVU: A Case Study. CoRR abs/1609.02954 (2016) - [i10]Bert Busstra, Nhien-An Le-Khac, M. Tahar Kechadi:
Android and Wireless data-extraction using Wi-Fi. CoRR abs/1609.02966 (2016) - [i9]Fan Cai, Nhien-An Le-Khac, M. Tahar Kechadi:
An Integrated Classification Model for Financial Data Mining. CoRR abs/1609.02976 (2016) - [i8]Steven Ryder, Nhien-An Le-Khac:
The End of effective Law Enforcement in the Cloud? To encypt, or not to encrypt. CoRR abs/1609.07602 (2016) - [i7]Pieter Van Vliet, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics in Industrial Control System: A Case Study. CoRR abs/1611.01754 (2016) - [i6]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
Toward a new mobile cloud forensic framework. CoRR abs/1611.09564 (2016) - [i5]Muhammad Faheem, M. Tahar Kechadi, Nhien-An Le-Khac:
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends. CoRR abs/1611.09566 (2016) - [i4]Christos Sgaras, M. Tahar Kechadi, Nhien-An Le-Khac:
Forensics Acquisition and Analysis of instant messaging and VoIP applications. CoRR abs/1612.00204 (2016) - 2015
- [i3]Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, M. Tahar Kechadi:
HTML5 Zero Configuration Covert Channels: Security Risks and Challenges. CoRR abs/1510.00661 (2015) - [i2]Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac:
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps. CoRR abs/1510.00664 (2015) - 2014
- [i1]Mark Scanlon, Jason Farina, Nhien-An Le-Khac, M. Tahar Kechadi:
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync. CoRR abs/1409.8486 (2014)
Coauthor Index
aka: Mohand Tahar Kechadi
aka: K. Aditya
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint