Nhien-An Le-Khac
Cited by
Cited by
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
Performance study of distributed Apriori-like frequent itemsets mining
LM Aouad, NA Le-Khac, TM Kechadi
Knowledge and Information Systems 23 (1), 55-72, 2010
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
Distributed frequent itemsets mining in heterogeneous platforms
LM Aouad, NA Le-Khac, TM Kechadi
Journal of engineering, computing and architecture 1 (2), 1-12, 2007
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
A data mining-based solution for detecting suspicious money laundering cases in an investment bank
NA Le Khac, S Markos, MT Kechadi
2010 Second International Conference on Advances in Databases, Knowledge …, 2010
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends
M Faheem, T Kechadi, NA Le-Khac
International Journal of Digital Crime and Forensics (IJDCF) 7 (2), 1-19, 2015
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
One-Class Collective Anomaly Detection Based on LSTM-RNNs
NN Thi, VL Cao, NA Le-Khac
Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI, 73-85, 2017
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
Admire framework: Distributed data mining on data grid platforms.
NA Le-Khac, MT Kechadi, J Carthy
ICSOFT (2), 67-72, 2006
Overview of the Forensic Investigation of Cloud Services
J Farina, M Scanlon, MT Le-Khac, N-A, Kechadi
10th International Conference on Availability, Reliability and Security …, 2015
Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool
M Faheem, NA Le-Khac, T Kechadi
Scientific Research Publishing 5, 83-90, 2014
The system can't perform the operation now. Try again later.
Articles 1–20