Nhien-An Le-Khac

Orcid: 0000-0003-4373-2212

According to our database1, Nhien-An Le-Khac authored at least 192 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics.
Forensic Sci. Int. Digit. Investig., December, 2023

A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training.
Forensic Sci. Int. Digit. Investig., December, 2023

Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis.
CoRR, 2023

Virtual Fusion with Contrastive Learning for Single Sensor-based Activity Recognition.
CoRR, 2023

Enhancing Illicit Activity Detection using XAI: A Multimodal Graph-LLM Framework.
CoRR, 2023

Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset.
CoRR, 2023

A Zero-Shot Deep Learning Approach for Unknown IoT Botnet Attack Detection.
Proceedings of the International Conference on Computing and Communication Technologies, 2023

Forensic Analysis of the iOS Apple Pay Mobile Payment System.
Proceedings of the Advances in Digital Forensics XIX, 2023

Identify Users on Dating Applications: A Forensic Perspective.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

SoK: The Next Phase of Identifying Illicit Activity in Bitcoin.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023

FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022

Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review.
Remote. Sens., 2022

An efficient IoT forensic approach for the evidence acquisition and analysis based on network link.
Log. J. IGPL, 2022

Learn to Adapt: Robust Drift Detection in Security Domain.
CoRR, 2022

Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications.
CoRR, 2022

Knowledge representation in digital agriculture: A step towards standardised model.
Comput. Electron. Agric., 2022

OAK4XAI: Model Towards Out-of-Box eXplainable Artificial Intelligence for Digital Agriculture.
Proceedings of the Artificial Intelligence XXXIX, 2022

4DHI: An index for approximate kNN search of remotely sensed images in Key-Value databases.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

Towards a Privacy, Secured and Distributed Clinical Data Warehouse Architecture.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022

DACMA: Designing space ordering optimizations to scalably manage aerial images.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Adversarial XAI Methods in Cybersecurity.
IEEE Trans. Inf. Forensics Secur., 2021

A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique.
J. Netw. Comput. Appl., 2021

Structural textile pattern recognition and processing based on hypergraphs.
Inf. Retr. J., 2021

Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics].
IEEE Secur. Priv., 2021

A comparative study of support vector machine and neural networks for file type identification using n-gram analysis.
Digit. Investig., 2021

Machine learning based approach to analyze file meta data for smart phone file triage.
Digit. Investig., 2021

Forensic analysis of Matrix protocol and Riot.im application.
Digit. Investig., 2021

Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis.
Digit. Investig., 2021

Vec2UAge: Enhancing underage age estimation performance through facial embeddings.
Digit. Investig., 2021

Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site.
CoRR, 2021

Code-free cloud computing service to facilitate rapid biomedical digital signal processing and algorithm development.
Comput. Methods Programs Biomed., 2021

Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets.
IEEE Access, 2021

Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis.
IEEE Access, 2021

Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape.
IEEE Access, 2021

Domain Specific Entity Recognition With Semantic-Based Deep Learning Approach.
IEEE Access, 2021

Automatically Estimate Clusters in Autoencoder-based Clustering Model for Anomaly Detection.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021

Accessing Secure Data on Android Through Application Analysis.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Towards Improving Privacy of Synthetic DataSets.
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021

Linking CVE's to MITRE ATT&CK Techniques.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Security Considerations for Internet of Things: A Survey.
SN Comput. Sci., 2020

Data warehouse and decision support on integrated crop big data.
Int. J. Bus. Process. Integr. Manag., 2020

Smart vehicle forensics: Challenges and case study.
Future Gener. Comput. Syst., 2020

Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection.
Digit. Investig., 2020

Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework.
Digit. Investig., 2020

EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis.
Digit. Investig., 2020

Forensic analysis of privacy-oriented cryptocurrencies.
Digit. Investig., 2020

DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation.
Digit. Investig., 2020

Identifying interception possibilities for WhatsApp communication.
CoRR, 2020

Lightweight privacy-Preserving data classification.
Comput. Secur., 2020

InSDN: A Novel SDN Intrusion Dataset.
IEEE Access, 2020

DDoSNet: A Deep-Learning Model for Detecting Network Attacks.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Towards a new deep learning based approach for the password prediction.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards A New Approach to Identify WhatsApp Messages.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Network Anomaly Detection Using LSTM Based Autoencoder.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Detecting Abnormal Traffic in Large-Scale Networks.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Retrieving E-Dating Application Artifacts from iPhone Backups.
Proceedings of the Advances in Digital Forensics XVI, 2020

Retracing the Flow of the Stream: Investigating Kodi Streaming Services.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

Clustering-Based Deep Autoencoders for Network Anomaly Detection.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

OAK: Ontology-Based Knowledge Map Model for Digital Agriculture.
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020

Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020

Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Effect of Security Controls on Patching Window: A Causal Inference based Approach.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Forensic Investigation of Ransomware Activities - Part 1.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Bitcoin-Network Protocol from a Forensic Perspective.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of PayPal Accounts.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Approaches for Cloud Service Models: A Survey.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Long Term Evolution Network Security and Real-Time Data Extraction.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Defending IoT Devices from Malware.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

So, What's Next?
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Towards an Automated Process to Categorise Tor's Hidden Services.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

CCTV Forensics in the Big Data Era: Challenges and Approaches.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of Ransomware Activities - Part 2.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

2019
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices.
Digit. Investig., 2019

A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics.
Digit. Investig., 2019

Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.
Digit. Investig., 2019

Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019

Knowledge Map: Toward a New Approach Supporting the Knowledge Management in Distributed Data Mining.
CoRR, 2019

Machine-Learning Techniques for Detecting Attacks in SDN.
CoRR, 2019

A Security-Aware Access Model for Data-Driven EHR System.
CoRR, 2019

An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.
IEEE Access, 2019

Distributed Deep Deterministic Policy Gradient for Power Allocation Control in D2D-Based V2V Communications.
IEEE Access, 2019

Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Access, 2019

Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Predicting Soil pH by Using Nearest Fields.
Proceedings of the Artificial Intelligence XXXVI, 2019

A Graph Database-Based Approach to Analyze Network Log Files.
Proceedings of the Network and System Security - 13th International Conference, 2019

Efficient LiDAR point cloud data encoding for scalable data management within the Hadoop eco-system.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Designing and Implementing Data Warehouse for Agricultural Big Data.
Proceedings of the Big Data - BigData 2019, 2019

Black Box Attacks on Deep Anomaly Detectors.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018

Forensic framework to identify local vs synced artefacts.
Digit. Investig., 2018

An Efficient Data Warehouse for Crop Yield Prediction.
CoRR, 2018

Forensic Analysis of the exFAT artefacts.
CoRR, 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.
CoRR, 2018

One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks.
CoRR, 2018

Enabling Trust in Deep Learning Models: A Digital Forensics Case Study.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Forensic Investigation Framework for Smart Home Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Evaluating Automated Facial Age Estimation Techniques for Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Ontology Based Approach for Precision Agriculture.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic.
Proceedings of the Advances in Digital Forensics XIV, 2018

Internet of Things Forensics - Challenges and a Case Study.
Proceedings of the Advances in Digital Forensics XIV, 2018

RiskWriter: Predicting Cyber Risk of an Enterprise.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Solid State Drive Forensics: Where Do We Stand?
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Privacy Preserving Internet Browsers: Forensic Analysis of Browzar.
Proceedings of the Computer and Network Security Essentials., 2018

2017
One-Class Collective Anomaly Detection Based on LSTM-RNNs.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Forensic Analysis of Virtual Hard Drives.
J. Digit. Forensics Secur. Law, 2017

Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic.
CoRR, 2017

Privacy Preserving Internet Browsers: Forensic Analysis of Browzar.
CoRR, 2017

Distributed Spatial Data Clustering as a New Approach for Big Data Analysis.
CoRR, 2017

Increasing digital investigator availability through efficient workflow management and automation.
CoRR, 2017

Forensic Analysis of Epic Privacy Browser on Windows Operating Systems.
CoRR, 2017

Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification.
CoRR, 2017

Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.
CoRR, 2017

A Bespoke Forensics GIS Tool.
CoRR, 2017

Toward a Distributed Knowledge Discovery system for Grid systems.
CoRR, 2017

Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Datasets.
CoRR, 2017

Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network.
CoRR, 2017

Grid-based Approaches for Distributed Data Mining Applications.
CoRR, 2017

Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.
IEEE Access, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privileged Data Within Digital Evidence.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets.
Proceedings of the Data Mining, 2017

2016
A Natural Language Processing Tool for White Collar Crime Investigation.
Trans. Large Scale Data Knowl. Centered Syst., 2016

Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.
Digit. Investig., 2016

Toward a new tool to extract the Evidence from a Memory Card of Mobile phones.
CoRR, 2016

Data Reduction in Very Large Spatio-Temporal Data Sets.
CoRR, 2016

Forensics Acquisition of IMVU: A Case Study.
CoRR, 2016

The End of effective Law Enforcement in the Cloud? To encypt, or not to encrypt.
CoRR, 2016

Unidirectional Secure Information Transfer via RabbitMQ.
CoRR, 2016

Control Flow Change in Assembly as a Classifier in Malware Analysis.
CoRR, 2016

An efficient customer search tool within an Anti-Money Laundering application implemented on an international bank's dataset.
CoRR, 2016

Toward a new mobile cloud forensic framework.
CoRR, 2016

An Integrated Classification Model for Financial Data Mining.
CoRR, 2016

Android and Wireless data-extraction using Wi-Fi.
CoRR, 2016

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data.
Proceedings of the Applications of Evolutionary Computation - 19th European Conference, 2016

Efficient Large Scale Clustering Based on Data Partitioning.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Forensic Acquisition of IMVU: A Case Study.
J. Digit. Forensics Secur. Law, 2015

MapExif: An Image Scanning and Mapping Tool for Investigators.
Int. J. Digit. Crime Forensics, 2015

The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends.
Int. J. Digit. Crime Forensics, 2015

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps.
CoRR, 2015

HTML5 Zero Configuration Covert Channels: Security Risks and Challenges.
CoRR, 2015

Toward a new approach for massive LiDAR data processing.
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015

Forensics in Industrial Control System: A Case Study.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Overview of the Forensic Investigation of Cloud Services.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
J. Digit. Forensics Secur. Law, 2014

Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications.
Proceedings of the Computational Forensics, 2014

Forensic Analysis of the TomTom Navigation Application.
Proceedings of the Advances in Digital Forensics X, 2014

Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets.
Int. J. Bus. Intell. Res., 2012

An Integrated Model for Financial Data Mining.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2012

An Open Framework for Smartphone Evidence Acquisition.
Proceedings of the Advances in Digital Forensics VIII, 2012

Toward a new classification model for analysing financial datasets.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

2011
Efficient Distributed Approach for Density-Based Clustering.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Comparing two density-based clustering methods for reducing very large spatio-temporal dataset.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

On a Distributed Approach for Density-Based Clustering.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

A New Hybrid Clustering Method for Reducing Very Large Spatio-temporal Dataset.
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011

2010
Performance study of distributed Apriori-like frequent itemsets mining.
Knowl. Inf. Syst., 2010

Data Reduction in Very Large Spatio-Temporal Datasets.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

Application of Data Mining for Anti-money Laundering Detection: A Case Study.
Proceedings of the ICDMW 2010, 2010

A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank.
Proceedings of the Second International Conference on Advances in Databases, 2010

A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Persistent Workflow on the Grid.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Lightweight Clustering Technique for Distributed Data Mining Applications.
Proceedings of the Advances in Data Mining. Theoretical Aspects and Applications, 2007

An efficient support management tool for distributed data mining environments.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Variance-based Clustering Technique for Distributed Data Mining Applications.
Proceedings of the 2007 International Conference on Data Mining, 2007

A New Approach for Distributed Density Based Clustering on Grid Platform.
Proceedings of the Data Management. Data, 2007

2006
Studying the Performance of Overlapping Communication and Computation by Active Message: INUKTITUT Case.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Admire framework: Distributed data mining on data grid platforms.
Proceedings of the ICSOFT 2006, 2006

2005
Performance Evaluation of INUKTITUT: An Efficient Interface for Asynchronous Parallel Programming Environment Athapascan.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005


  Loading...