Follow
Nhien-An Le-Khac
Title
Cited by
Cited by
Year
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
2562016
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020
126*2020
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
962010
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
892017
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
852016
InSDN: A Novel SDN Intrusion Dataset
MS Elsayed, NA Le-Khac, AD Jurcut
IEEE Access 8, 2020
842020
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
78*2018
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
692018
Security Considerations for Internet of Things: A Survey
A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac
Springer SN Computer Science, 2020
652020
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
632017
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
602015
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
582019
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
57*2012
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
552018
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
522019
Network Anomaly Detection Using LSTM Based Autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
502020
Distributed frequent itemsets mining in heterogeneous platforms
LM Aouad, NA Le-Khac, TM Kechadi
Journal of engineering, computing and architecture 1 (2), 1-12, 2007
502007
Performance study of distributed Apriori-like frequent itemsets mining
LM Aouad, NA Le-Khac, TM Kechadi
Knowledge and Information Systems 23 (1), 55-72, 2010
492010
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security
A Kuppa, NA Le-Khac
IEEE International Joint Conference on Neural Networks (IJCNN), 2020
442020
A data mining-based solution for detecting suspicious money laundering cases in an investment bank
NA Le Khac, S Markos, MT Kechadi
2010 Second International Conference on Advances in Databases, Knowledge …, 2010
442010
The system can't perform the operation now. Try again later.
Articles 1–20