Nhien-An Le-Khac
Orcid: 0000-0003-4373-2212
According to our database1,
Nhien-An Le-Khac
authored at least 202 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Pattern Recognit., 2025
2024
Vietnam. J. Comput. Sci., July, 2024
Ontology Knowledge Map Approach Towards Building Linked Data for Vietnamese Legal Applications.
Vietnam. J. Comput. Sci., May, 2024
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics.
J. Univers. Comput. Sci., 2024
Int. J. Netw. Manag., 2024
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics.
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
D-CAPTCHA++: A Study of Resilience of Deepfake CAPTCHA under Transferable Imperceptible Adversarial Attack.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics.
Forensic Sci. Int. Digit. Investig., December, 2023
A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training.
Forensic Sci. Int. Digit. Investig., December, 2023
CoRR, 2023
Virtual Fusion with Contrastive Learning for Single Sensor-based Activity Recognition.
CoRR, 2023
CoRR, 2023
Crossed-IoT device portability of Electromagnetic Side Channel Analysis: Challenges and Dataset.
CoRR, 2023
Proceedings of the International Conference on Computing and Communication Technologies, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks.
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs.
IEEE Trans. Cogn. Commun. Netw., 2022
Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review.
Remote. Sens., 2022
An efficient IoT forensic approach for the evidence acquisition and analysis based on network link.
Log. J. IGPL, 2022
Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications.
CoRR, 2022
Comput. Electron. Agric., 2022
OAK4XAI: Model Towards Out-of-Box eXplainable Artificial Intelligence for Digital Agriculture.
Proceedings of the Artificial Intelligence XXXIX, 2022
4DHI: An index for approximate kNN search of remotely sensed images in Key-Value databases.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022
Proceedings of the Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique.
J. Netw. Comput. Appl., 2021
Inf. Retr. J., 2021
IEEE Secur. Priv., 2021
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis.
Digit. Investig., 2021
Machine learning based approach to analyze file meta data for smart phone file triage.
Digit. Investig., 2021
Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis.
Digit. Investig., 2021
Digit. Investig., 2021
Protect Against Unintentional Insider Threats: The risk of an employee's cyber misconduct on a Social Media Site.
CoRR, 2021
Code-free cloud computing service to facilitate rapid biomedical digital signal processing and algorithm development.
Comput. Methods Programs Biomed., 2021
Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets.
IEEE Access, 2021
IEEE Access, 2021
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape.
IEEE Access, 2021
IEEE Access, 2021
Automatically Estimate Clusters in Autoencoder-based Clustering Model for Anomaly Detection.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Proceedings of the Privacy Technologies and Policy - 9th Annual Privacy Forum, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Int. J. Bus. Process. Integr. Manag., 2020
Future Gener. Comput. Syst., 2020
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection.
Digit. Investig., 2020
Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework.
Digit. Investig., 2020
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis.
Digit. Investig., 2020
Digit. Investig., 2020
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Black Box Attacks on Explainable Artificial Intelligence(XAI) methods in Cyber Security.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Proceedings of the Future Data and Security Engineering - 7th International Conference, 2020
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
Proceedings of the Cyber and Digital Forensic Investigations, 2020
2019
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices.
Digit. Investig., 2019
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics.
Digit. Investig., 2019
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.
Digit. Investig., 2019
Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digit. Investig., 2019
Knowledge Map: Toward a New Approach Supporting the Knowledge Management in Distributed Data Mining.
CoRR, 2019
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.
IEEE Access, 2019
Distributed Deep Deterministic Policy Gradient for Power Allocation Control in D2D-Based V2V Communications.
IEEE Access, 2019
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Access, 2019
Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Artificial Intelligence XXXVI, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Efficient LiDAR point cloud data encoding for scalable data management within the Hadoop eco-system.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Big Data - BigData 2019, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.
CoRR, 2018
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks.
CoRR, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018
Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic.
CoRR, 2017
CoRR, 2017
Increasing digital investigator availability through efficient workflow management and automation.
CoRR, 2017
Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification.
CoRR, 2017
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.
CoRR, 2017
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Datasets.
CoRR, 2017
Collective Anomaly Detection based on Long Short Term Memory Recurrent Neural Network.
CoRR, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017
Proceedings of the Data Mining, 2017
2016
Trans. Large Scale Data Knowl. Centered Syst., 2016
Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists.
Digit. Investig., 2016
CoRR, 2016
CoRR, 2016
An efficient customer search tool within an Anti-Money Laundering application implemented on an international bank's dataset.
CoRR, 2016
Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016
Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data.
Proceedings of the Applications of Evolutionary Computation - 19th European Conference, 2016
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Int. J. Digit. Crime Forensics, 2015
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends.
Int. J. Digit. Crime Forensics, 2015
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps.
CoRR, 2015
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015
Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
J. Digit. Forensics Secur. Law, 2014
Proceedings of the Computational Forensics, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
2013
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013
2012
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets.
Int. J. Bus. Intell. Res., 2012
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2012
Proceedings of the Advances in Digital Forensics VIII, 2012
Proceedings of the Seventh International Conference on Digital Information Management, 2012
2011
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011
Comparing two density-based clustering methods for reducing very large spatio-temporal dataset.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011
2010
Knowl. Inf. Syst., 2010
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010
Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010
Proceedings of the ICDMW 2010, 2010
A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank.
Proceedings of the Second International Conference on Advances in Databases, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009
Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
2008
Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Advances in Data Mining. Theoretical Aspects and Applications, 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Variance-based Clustering Technique for Distributed Data Mining Applications.
Proceedings of the 2007 International Conference on Data Mining, 2007
Proceedings of the Data Management. Data, 2007
2006
Studying the Performance of Overlapping Communication and Computation by Active Message: INUKTITUT Case.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006
Admire framework: Distributed data mining on data grid platforms.
Proceedings of the ICSOFT 2006, 2006
2005
Performance Evaluation of INUKTITUT: An Efficient Interface for Asynchronous Parallel Programming Environment Athapascan.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005