关注
Nhien-An Le-Khac
Nhien-An Le-Khac
Professor (Associate), University College Dublin
在 ucd.ie 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
L Bontemps, VL Cao, J McDermott, NA Le-Khac
International Conference on Future Data and Security Engineering, 141-152, 2016
2792016
DDoSNet: A Deep-Learning Model for Detecting Network Attacks
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020
161*2020
InSDN: A Novel SDN Intrusion Dataset
MS Elsayed, NA Le-Khac, AD Jurcut
IEEE Access 8, 2020
1132020
Application of data mining for anti-money laundering detection: A case study
NA Le Khac, MT Kechadi
2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010
1032010
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service
X Du, NA Le-Khac, M Scanlon
16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017
922017
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists
B Hitchcock, NA Le-Khac, M Scanlon
Digital Forensics Research Workshop, DFRWS EU 2016, 2016
922016
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi
S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac
Springer, Heidelberg, Germany, 2018
89*2018
Network Anomaly Detection Using LSTM Based Autoencoder
M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut
Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020
772020
Security Considerations for Internet of Things: A Survey
A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac
Springer SN Computer Science, 2020
772020
Smart Vehicle Forensics: Challenges and Case Study
NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo
Future Generation of Computer Systems, 2018
772018
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core
L Van der Horst, KKR Choo, NA Le-Khac
IEEE Access 5 (1), 2017
692017
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications
C Sgaras, MT Kechadi, NA Le-Khac
Computational Forensics, 188-199, 2015
672015
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach
KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen
IEEE Access 7, 100480-100490, 2019
652019
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
A Sayakkara, NA Le-Khac, M Scanlon
Digital Investigation 29, 43-54, 2019
632019
Clustering approaches for financial data analysis: a survey
F Cai, NA Le-Khac, MT Kechadi
8th International Conference on Data Mining (DMIN 2012), 105-111, 2012
58*2012
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security
A Kuppa, NA Le-Khac
IEEE International Joint Conference on Neural Networks (IJCNN), 2020
562020
A Forensic Investigation Framework for Smart Home Environment
A Goudbeek, KKR Choo, NA Le-Khac
17th IEEE International Conference On Trust, Security And Privacy In …, 2018
562018
Black Box Attacks on Deep Anomaly Detectors
A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac
Proceedings of the 14th International Conference on Availability …, 2019
532019
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique
MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut
Journal of Network and Computer Applications, 103160, 2021
512021
Distributed frequent itemsets mining in heterogeneous platforms
LM Aouad, NA Le-Khac, TM Kechadi
Journal of engineering, computing and architecture 1 (2), 1-12, 2007
512007
系统目前无法执行此操作,请稍后再试。
文章 1–20