Follow
Nhien-An Le-Khac
Title
Cited by
Cited by
Year
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
3042016
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020
222*2020
InSDN: A Novel SDN Intrusion Dataset
MS Elsayed, NA Le-Khac, AD Jurcut
IEEE Access 8, 2020
1982020
Network Anomaly Detection Using LSTM Based Autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
1412020
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
1142010
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
109*2018
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut
Journal of Network and Computer Applications, 103160, 2021
1072021
Security Considerations for Internet of Things: A Survey
A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac
Springer SN Computer Science, 2020
1062020
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
1022018
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
982016
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
972017
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
942019
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
822017
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security
A Kuppa, NA Le-Khac
IEEE International Joint Conference on Neural Networks (IJCNN), 2020
802020
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape
J Nicholls, A Kuppa, NA Le-Khac
IEEE Access, 2021
782021
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
752019
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
69*2012
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
662015
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
652018
Machine Learning Techniques for Detecting Attacks in SDN
SM Elsayed, NA Le-Khac, S Dev, AD Jurcut
7th IEEE International Conference on Computer Science and Network Technology …, 2019
592019
The system can't perform the operation now. Try again later.
Articles 1–20