Nhien-An Le-Khac
Cited by
Cited by
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020
InSDN: A Novel SDN Intrusion Dataset
MS Elsayed, NA Le-Khac, AD Jurcut
IEEE Access 8, 2020
Network Anomaly Detection Using LSTM Based Autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut
Journal of Network and Computer Applications, 103160, 2021
Security Considerations for Internet of Things: A Survey
A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac
Springer SN Computer Science, 2020
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape
J Nicholls, A Kuppa, NA Le-Khac
IEEE Access, 2021
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security
A Kuppa, NA Le-Khac
IEEE International Joint Conference on Neural Networks (IJCNN), 2020
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
A Flow Based Anomaly Detection Approach with Feature Selection Method Against DDoS Attacks inSDNs
M El Sayed, NA Le-Khac, M Azer, A Jurcut
IEEE Transactions on Cognitive Communications and Networking, 2022
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20