Nhien-An Le-Khac

According to our database1, Nhien-An Le-Khac authored at least 69 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics.
Digital Investigation, 2019

Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.
Digital Investigation, 2019

Improving the accuracy of automated facial age estimation to aid CSEM investigations.
Digital Investigation, 2019

Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Access, 2019

Designing and Implementing Data Warehouse for Agricultural Big Data.
Proceedings of the Big Data - BigData 2019, 2019

Black Box Attacks on Deep Anomaly Detectors.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Digital forensic investigation of two-way radio communication equipment and services.
Digital Investigation, 2018

Forensic framework to identify local vs synced artefacts.
Digital Investigation, 2018

A Forensic Investigation Framework for Smart Home Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Evaluating Automated Facial Age Estimation Techniques for Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Ontology Based Approach for Precision Agriculture.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysis.
Proceedings of the Companion Proceedings for the ISSTA/ECOOP 2018 Workshops, 2018

Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic.
Proceedings of the Advances in Digital Forensics XIV, 2018

Internet of Things Forensics - Challenges and a Case Study.
Proceedings of the Advances in Digital Forensics XIV, 2018

RiskWriter: Predicting Cyber Risk of an Enterprise.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Privacy Preserving Internet Browsers: Forensic Analysis of Browzar.
Proceedings of the Computer and Network Security Essentials., 2018

2017
One-Class Collective Anomaly Detection Based on LSTM-RNNs.
T. Large-Scale Data- and Knowledge-Centered Systems, 2017

Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.
IEEE Access, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privileged Data Within Digital Evidence.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems.
Proceedings of the Future Data and Security Engineering - 4th International Conference, 2017

Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets.
Proceedings of the Data Mining, 2017

2016
A Natural Language Processing Tool for White Collar Crime Investigation.
Trans. Large-Scale Data- and Knowledge-Centered Systems, 2016

Designing Hybrid Cloud Computing Framework using OpenStack for Supporting Multimedia with Security and Privacy.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks.
Proceedings of the Future Data and Security Engineering - Third International Conference, 2016

Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data.
Proceedings of the Applications of Evolutionary Computation - 19th European Conference, 2016

Efficient Large Scale Clustering Based on Data Partitioning.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

The End of Effective Law Enforcement in the Cloud? - To Encrypt, or Not to Encrypt.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Forensic Acquisition of IMVU: A Case Study.
JDFSL, 2015

MapExif: An Image Scanning and Mapping Tool for Investigators.
IJDCF, 2015

The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends.
IJDCF, 2015

Toward a new approach for massive LiDAR data processing.
Proceedings of the 2nd IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2015

Forensics in Industrial Control System: A Case Study.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Overview of the Forensic Investigation of Cloud Services.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync.
JDFSL, 2014

Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications.
Proceedings of the Computational Forensics, 2014

Forensic Analysis of the TomTom Navigation Application.
Proceedings of the Advances in Digital Forensics X, 2014

Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Feature Selection Parallel Technique for Remotely Sensed Imagery Classification.
Proceedings of the Computational Science and Its Applications - ICCSA 2013, 2013

2012
A Tree-Based Approach for Detecting Redundant Business Rules in Very Large Financial Datasets.
IJBIR, 2012

An Integrated Model for Financial Data Mining.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2012

An Open Framework for Smartphone Evidence Acquisition.
Proceedings of the Advances in Digital Forensics VIII, 2012

Toward a new classification model for analysing financial datasets.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

2011
Efficient Distributed Approach for Density-Based Clustering.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Comparing two density-based clustering methods for reducing very large spatio-temporal dataset.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

On a Distributed Approach for Density-Based Clustering.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

A New Hybrid Clustering Method for Reducing Very Large Spatio-temporal Dataset.
Proceedings of the Advanced Data Mining and Applications - 7th International Conference, 2011

2010
Performance study of distributed Apriori-like frequent itemsets mining.
Knowl. Inf. Syst., 2010

Data Reduction in Very Large Spatio-Temporal Datasets.
Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010

Performance Evaluation of a Knowledge-based Solution for Detecting Money Laundering in an Investment Bank.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

Application of Data Mining for Anti-money Laundering Detection: A Case Study.
Proceedings of the ICDMW 2010, 2010

A Data Mining-Based Solution for Detecting Suspicious Money Laundering Cases in an Investment Bank.
Proceedings of the Second International Conference on Advances in Databases, 2010

A Clustering-Based Data Reduction for Very Large Spatio-Temporal Datasets.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
An Efficient Search Tool For An Anti-Money Laundering Application Of An Multi-National Bank's Dataset.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

Towards a New Data Mining-Based Approach for Anti-Money Laundering in an International Investment Bank.
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009

2008
Handling Large Volumes of Mined Knowledge with a Self-Reconfigurable Topology on Distributed Systems.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Persistent Workflow on the Grid.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Lightweight Clustering Technique for Distributed Data Mining Applications.
Proceedings of the Advances in Data Mining. Theoretical Aspects and Applications, 2007

An efficient support management tool for distributed data mining environments.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Variance-based Clustering Technique for Distributed Data Mining Applications.
Proceedings of the 2007 International Conference on Data Mining, 2007

A New Approach for Distributed Density Based Clustering on Grid Platform.
Proceedings of the Data Management. Data, 2007

2006
Studying the Performance of Overlapping Communication and Computation by Active Message: INUKTITUT Case.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Admire framework: Distributed data mining on data grid platforms.
Proceedings of the ICSOFT 2006, 2006

2005
Performance Evaluation of INUKTITUT: An Efficient Interface for Asynchronous Parallel Programming Environment Athapascan.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005


  Loading...