Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks L Bontemps, VL Cao, J McDermott, NA Le-Khac International Conference on Future Data and Security Engineering, 141-152, 2016 | 279 | 2016 |
DDoSNet: A Deep-Learning Model for Detecting Network Attacks M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, 2020 | 161* | 2020 |
InSDN: A Novel SDN Intrusion Dataset MS Elsayed, NA Le-Khac, AD Jurcut IEEE Access 8, 2020 | 113 | 2020 |
Application of data mining for anti-money laundering detection: A case study NA Le Khac, MT Kechadi 2010 IEEE International Conference on Data Mining Workshops, 577-584, 2010 | 103 | 2010 |
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service X Du, NA Le-Khac, M Scanlon 16th European Conference on Cyber Warfare and Security (ECCWS 2017), 573-581, 2017 | 92 | 2017 |
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists B Hitchcock, NA Le-Khac, M Scanlon Digital Forensics Research Workshop, DFRWS EU 2016, 2016 | 92 | 2016 |
Internet of Things Forensics: Challenges and Case Study Advances in Digital Forensics XIV, G. Peterson and S. Shenoi S Alabdulsalam, K Schaefer, MT Kechadi, NA Le-Khac Springer, Heidelberg, Germany, 2018 | 89* | 2018 |
Network Anomaly Detection Using LSTM Based Autoencoder M Said Elsayed, NA Le-Khac, S Dev, AD Jurcut Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and …, 2020 | 77 | 2020 |
Security Considerations for Internet of Things: A Survey A Jurcut, N Tiberui, PS Ranaweera, NA Le-Khac Springer SN Computer Science, 2020 | 77 | 2020 |
Smart Vehicle Forensics: Challenges and Case Study NA Le-Khac, D Jacobs, J Nijhoff, K Bertens, KKR Choo Future Generation of Computer Systems, 2018 | 77 | 2018 |
Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core L Van der Horst, KKR Choo, NA Le-Khac IEEE Access 5 (1), 2017 | 69 | 2017 |
Forensics Acquisition and Analysis of Instant Messaging and VoIP Applications C Sgaras, MT Kechadi, NA Le-Khac Computational Forensics, 188-199, 2015 | 67 | 2015 |
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach KK Nguyen, TQ Duong, NA Vien, NA Le-Khac, MN Nguyen IEEE Access 7, 100480-100490, 2019 | 65 | 2019 |
A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics A Sayakkara, NA Le-Khac, M Scanlon Digital Investigation 29, 43-54, 2019 | 63 | 2019 |
Clustering approaches for financial data analysis: a survey F Cai, NA Le-Khac, MT Kechadi 8th International Conference on Data Mining (DMIN 2012), 105-111, 2012 | 58* | 2012 |
Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security A Kuppa, NA Le-Khac IEEE International Joint Conference on Neural Networks (IJCNN), 2020 | 56 | 2020 |
A Forensic Investigation Framework for Smart Home Environment A Goudbeek, KKR Choo, NA Le-Khac 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 56 | 2018 |
Black Box Attacks on Deep Anomaly Detectors A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac Proceedings of the 14th International Conference on Availability …, 2019 | 53 | 2019 |
A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique MS ElSayed, NA Le-Khac, MA Albahar, A Jurcut Journal of Network and Computer Applications, 103160, 2021 | 51 | 2021 |
Distributed frequent itemsets mining in heterogeneous platforms LM Aouad, NA Le-Khac, TM Kechadi Journal of engineering, computing and architecture 1 (2), 1-12, 2007 | 51 | 2007 |