Follow
Nhien-An Le-Khac
Title
Cited by
Cited by
Year
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
2882016
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020
187*2020
InSDN: A Novel SDN Intrusion Dataset
MS Elsayed, NA Le-Khac, AD Jurcut
IEEE Access 8, 2020
1372020
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
1072010
Network Anomaly Detection Using LSTM Based Autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
1032020
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
99*2018
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
942016
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
932017
Security Considerations for Internet of Things: A Survey
A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac
Springer SN Computer Science, 2020
882020
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
852018
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
752017
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
732019
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
712019
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
652015
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
65*2012
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut
Journal of Network and Computer Applications, 103160, 2021
642021
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security
A Kuppa, NA Le-Khac
IEEE International Joint Conference on Neural Networks (IJCNN), 2020
642020
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
632018
Black Box Attacks on Deep Anomaly Detectors
A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac
Proceedings of the 14th International Conference on Availability …, 2019
552019
Performance study of distributed Apriori-like frequent itemsets mining
LM Aouad, NA Le-Khac, TM Kechadi
Knowledge and Information Systems 23 (1), 55-72, 2010
522010
The system can't perform the operation now. Try again later.
Articles 1–20