Publications

Book

1. Le-Khac, Nhien-An; Kim-Kwang Raymond Choo (2022) “A Practical Hands-on Approach to Database Forensics”, Springer International Publishing, October 2022, ISBN: 978-3-031-16126-1, https://link.springer.com/book/10.1007/978-3-031-16127-8

2. Le-Khac, Nhien-An; Kim-Kwang Raymond Choo (Eds.) (2020) “Cyber and Digital Forensic Investigations – A Law Enforcement Practitioner’s Perspective”, Springer International Publishing, July 2020, https://doi.org/10.1007/978-3-030-47131-6

3.   Chen, L.; Takabi, H.; Le-Khac, N-A. (Eds.)  (2019) “Security, Privacy, and Digital Forensics in the Cloud”, High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385

 

Book Chapters

1. Nicholson, T., Hayes, D., Le-Khac, N-A. (2023). Forensic Analysis of the iOS Apple Pay Mobile Payment System. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIX. DigitalForensics 2023. IFIP Advances in Information and Communication Technology, vol 687. Springer, Cham. https://doi.org/10.1007/978-3-031-42991-0_1

2    Mazzarolo G., Casas J.C.F., Jurcut A.D., Le-Khac N-A. (2021) Protect Against Unintentional Insider Threats: The Risk of an Employee’s Cyber Misconduct on a Social Media Site. In: Weulen Kranenbarg M., Leukfeldt R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_6

3. Alabdulsalam Saad, Duong Trung Q., Choo Kim-Kwang Raymond, Le-Khac, N-A. (2020) “Evidence Identification and Acquisition based on Network Hidden Link in Internet of Things (IoT) Environments”, In: Herrero Á., Cambra C., Urda D., Sedano J., Quintián H., Corchado E. (eds). Advances in Intelligent Systems and Computing, vol 1267. Springer, Cham. https://doi.org/10.1007/978-3-030-57805-3_16

4. Ranul Thantilage, Le-Khac, N-A. (2020), “Forensic Analysis of E-Dating Applications based on iPhone Backups”, In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XVI. Digital Forensics 2020. IFIP Advances in Information and Communication Technology, vol. 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_12

5.  Vieyra J., Scanlon M., Le-Khac N-A. (2019) “Solid State Drive Forensics: Where Do We Stand?” In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 259. Springer, Cham. https://doi.org/10.1007/978-3-030-05487-8_8

6.  Van de Wiel E.; Scanlon M.; Le-Khac, N-A. (2018) “Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic”, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_11

7. Alabdulsalam Saad, Schaefer Kevin, M-T Kechadi, Le-Khac, N-A. (2018) “Internet of Things Forensics: Challenges and Case Study”, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_3

8.  Warren, C.; El-Sheikh, E.; Le-Khac, N-A. (2017) ‘Privacy Preserving Internet Browsers – Forensic Analysis of Browzar’ In: Daimi K. et al. (Eds.). Computer and Network Security Essentials. New York: Springer Berlin Heidelberg, (18 pages) DOI: https://doi.org/10.1007/978-3-319-58424-9_21

 
International peer-reviewed journals

 

2023

  1. Larsen O. H., Ngo H.Q., Le-Khac N-A. (2023), “A quantitative study of the law enforcement in using open source intelligence techniques through undergraduate practical training”, Forensic Science International: Digital Investigation, Volume 47, 2023, 301622, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2023.301622.
  2. Ngo H. Q., Le-Khac N-A. (2023), “Ontology-based case study management towards bridging training and actual investigation gaps in digital forensics”, Forensic Science International: Digital Investigation, Volume 47, 2023, 301621, ISSN 2666-2817, https://doi.org/10.1016/j.fsidi.2023.301621.
  3. Maolmhuaidh Fionn Ó., Thantilage Ranul D., Burtenshaw Denise,Raja Khuram, Le-Khac Nhien-An, Cahill Paul, ForsterRobert, M-Tahar Kechadi, (2023), “Clinical data warehouses for disease diagnosis: A focus on exosomal MicroRNA biomarkers“, Informatics in Medicine Unlocked, Volume 43, 2023, 101390, ISSN 2352-9148, https://doi.org/10.1016/j.imu.2023.101390.
  4. Thantilage R.D., Le-Khac N-A., Kechadi M-T. (2023), “Healthcare data security and privacy in Data Warehouse architectures”, Informatics in Medicine Unlocked, Volume 39, 2023, 101270, ISSN 2352-9148, https://doi.org/10.1016/j.imu.2023.101270.
  5. Sachintha S, Le-Khac N-A, Scanlon M, Sayakkara AP. (2023), “Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems”. Applied Sciences. 2023; 13(5):2928. https://doi.org/10.3390/app13052928 .

2022

1.  Kuppa A. and Le-Khac, N-A. (2022), “Learn to Adapt: Robust Drift Detection in Security Domain,” in Computers & Electrical Engineering, Vol. 102, 108239, 2022, DOI: https://doi.org/10.1016/j.compeleceng.2022.108239.

2.  Ngo Q. H., Kechadi T. and Le-Khac, N-A. (2022), “Knowledge representation in digital agriculture: A step towards standardised model,” in Computers and Electronics in Agriculture, vol. 199, 2022, DOI: https://doi.org/10.1016/j.compag.2022.107127.

3. ElSayed M., Le-Khac, N-A., Albahar M.A., Jurcut A. (2022), “A Flow Based Anomaly Detection Approach with Feature Selection Method Against DDoS Attacks inSDNs,” in IEEE Transactions on Cognitive Communications and Networking, 2022, DOI: https://doi.org/10.1109/TCCN.2022.3186331.

4. Alabdulsalam Saad, Duong Trung Q., Choo Kim-Kwang Raymond, and Le-Khac, N-A. (2022), “An efficient IoT forensic approach for the evidence acquisition and analysis based on network link”Logic Journal of the IGPL, 2022, DOI: https://doi.org/10.1093/jigpal/jzac012.

5. Hewage C. N. L., Laefer D., Vu V.,  Le-Khac N-A. and Bertolotto M. (2022), “Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review”, Remote Sensing. 2022; 14(20):5277. DOI: https://doi.org/10.3390/rs14205277

  

 

2021

1. Kuppa A. and Le-Khac, N-A. (2021), “Adversarial XAI Methods in Cybersecurity,” in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4924-4938, 2021, DOI: 10.1109/TIFS.2021.3117075.

2. Nicholls J., Kuppa A. and Le-Khac, N-A. (2021), “Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape,” in IEEE Access, vol. 9, pp. 163965-163986, 2021, DOI: 10.1109/ACCESS.2021.3134076. 

3. Wijnberg D., Le-Khac, N-A. (2021), “Identifying interception possibilities for WhatsApp communication”, Forensic Science International: Digital Investigation, Volume 38, Supplement, 2021, 301132, DOI: https://doi.org/10.1016/j.fsidi.2021.301132.

4. Schipper G.C, Seelt R., Le-Khac, N-A. (2021),”Forensic analysis of Matrix protocol and Riot.im application”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301118, DOI: https://doi.org/10.1016/j.fsidi.2021.301118.

5. Ngo Q. H., Kechadi T. and Le-Khac, N-A. (2021), “Domain Specific Entity Recognition with Semantic-Based Deep Learning Approach,” in IEEE Access, vol. 9, pp. 152892-152902, 2021, DOI: 10.1109/ACCESS.2021.3128178.

6. Serhal C., and Le-Khac, N-A. (2021), “Machine learning based approach to analyze file meta data for smart phone file triage”, Forensic Science International: Digital Investigation, Volume 37, Supplement, 2021, 301194, DOI: https://doi.org/10.1016/j.fsidi.2021.301194.

7. Sayakkara A. P. and Le-Khac, N-A. (2021), “Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets,” in IEEE Access, vol. 9, pp. 113585-113598, 2021, DOI: 10.1109/ACCESS.2021.3104525.

8. Sester J., Hayes D., Scanlon M., Le-Khac, N-A. (2021),” A comparative study of support vector machine and neural networks for file type identification using n-gram analysis”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301121, DOI: https://doi.org/10.1016/j.fsidi.2021.301121.

9. Sayakkara A. P. and Le-Khac, N-A. (2021), “Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis,” in IEEE Access, vol. 9, pp. 13237-13247, 2021, doi: 10.1109/ACCESS.2021.3051921.

10. Jennings M.R, Turner C., Bond R.R, Kennedy A., Thantilage A., Kechadi, T., Le-Khac, N-A., McLaughlin J., Finlay D.D. (2021),”Code-free cloud computing service to facilitate rapid biomedical digital signal processing and algorithm development”, Computer Methods and Programs in Biomedicine, Volume 211, 2021, 106398, DOI: https://doi.org/10.1016/j.cmpb.2021.106398.

11. Le Q., Miralles-Pechuán L., Sayakkara A., Le-Khac, N-A., Scanlon M. (2021), “Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis”, Forensic Science International: Digital Investigation, Volume 39, 2021, 301308, DOI: https://doi.org/10.1016/j.fsidi.2021.301308.

12. ElSayed M., Le-Khac, N-A., Albahar M.A., Jurcut A. (2021), “A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique”, Journal of Network and Computer Applications, Volume 191, 2021, 103160, DOI: https://doi.org/10.1016/j.jnca.2021.103160.

13. Anda F., Dixon E., Bou-Harb E. , Le-Khac, N-A., Scanlon M. (2021),”Vec2UAge: Enhancing underage age estimation performance through facial embeddings”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301119, DOI: https://doi.org/10.1016/j.fsidi.2021.301119.

14. ElSayed M., Le-Khac, N-A., Jurcut A. (2021), “Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics],” in IEEE Security & Privacy, vol. 19, no. 1, pp. 90-94, Jan.-Feb. 2021, doi: 10.1109/MSEC.2020.3037448.

15. Ngo, V.M., Helmer, S., Le-Khac, N-A. et al. (2021), “Structural textile pattern recognition and processing based on hypergraphs”. Inf Retrieval J 24, 137–173 (2021). https://doi.org/10.1007/s10791-020-09384-y

 

2020

1. Le-Khac, N-A., Jacobs D. , Nijhoff J., Bertens K., Kim-Kwang Raymond Choo, (2020) “Smart Vehicle Forensics: Challenges and Case Study”, Future Generation Computer Systems, Volume 109, 2020, Pages 500-510, DOI: https://doi.org/10.1016/j.future.2018.05.081. 

2. Tran H-N., Le-Khac, N-A., Kechadi M-T. (2020), “Lightweight privacy-Preserving data classification”, Computers & Security, Volume 97, 2020, 101835, DOI: https://doi.org/10.1016/j.cose.2020.101835.

3. Hayes D., Cappa F., Le-Khac, N-A. (2020), “An effective approach to mobile device management: Security and privacy issues associated with mobile applications”, Digital Business, Volume 1, Issue 1, 2020, 100001, DOI: https://doi.org/10.1016/j.digbus.2020.100001.

4. Jurcut, A., Niculcea, T., Ranaweera, P. Le-Khac, N-A. (2020), “Security Considerations for Internet of Things: A Survey”. SN COMPUT. SCI. 1, 193 (2020). DOI: https://doi.org/10.1007/s42979-020-00201-3

5. Koerhuis W., Kechadi T., Le-Khac N-A. (2020), “Forensic analysis of privacy-oriented cryptocurrencies”, Forensic Science International: Digital Investigation, Volume 33, 2020, 200891, DOI: https://doi.org/10.1016/j.fsidi.2019.200891.

6. ElSayed M., Le-Khac, N-A., Jurcut A. (2020), “InSDN: A Novel SDN Intrusion Dataset,” in IEEE Access, vol. 8, pp. 165263-165284, 2020, doi: 10.1109/ACCESS.2020.3022633.

7. Sayakkara A., Le-Khac, N-A., Scanlon M. (2020), “Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework”, Forensic Science International: Digital Investigation, Volume 33, Supplement, 2020, 301003, DOI: https://doi.org/10.1016/j.fsidi.2020.301003.

8. Sayakkara A., Miralles-Pechuán L., Le-Khac, N-A., Scanlon M. (2020), “Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection”, Forensic Science International: Digital Investigation, Volume 32, Supplement, 2020, 300927, DOI: https://doi.org/10.1016/j.fsidi.2020.300927.

9. Sayakkara A., Le-Khac, N-A., Scanlon M. (2020), “EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis”, Forensic Science International: Digital Investigation, Elsevier, March 2020, https://doi.org/10.1016/j.fsidi.2020.300907

10. Anda F., Le-Khac, N-A., Scanlon M. (2020), “DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation”, Forensic Science International: Digital Investigation, Volume 32, Supplement, 2020, 300921, DOI: https://doi.org/10.1016/j.fsidi.2020.300921.

11. Ngo V. M., Le-Khac, N-A., Kechadi M-T. (2020), “Data Warehouse and Decision Support on Integrated Crop Big Data”, International Journal of Business Process Integration and Management,  Vol. 10(1), 2020 pp. 17-28, DOI: https://doi.org/10.1504/IJBPIM.2020.113115

12. Vo AV., Laefer DF., Trifkovic M., Hewage CNL., Bertolotto M., Le-Khac N-A., Ofterdinger  U. (2020), “A Highly Scalable Data Management System For Point Cloud And Full Waveform Lidar Data”, The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 43, pp. 507-512, 2020, DOI:10.5194/isprs-archives-XLIII-B4-2020-507-2020

 

2019

1. Zollner S., Choo K-K.R. and Le-Khac N-A. (2019), “An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems,” in IEEE Access, vol. 7, pp. 158250-158263, 2019, doi: 10.1109/ACCESS.2019.2948774.

2. Nguyen K. K., Duong T. Q., Ngo V. A., Le-Khac N-A and Nguyen L. D. (2019), “Distributed Deep Deterministic Policy Gradient for Power Allocation Control in D2D-Based V2V Communications,” in IEEE Access, vol. 7, pp. 164533-164543, 2019, DOI: 10.1109/ACCESS.2019.2952411.

3. Nguyen K. K., Duong T. Q., Ngo V. A., Le-Khac N-A and Nguyen M. (2019), “Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach,” in IEEE Access, vol. 7, pp. 100480-100490, 2019, DOI: 10.1109/ACCESS.2019.2930115.

4. Sayakkara A., Le-Khac, N-A., Scanlon M. (2019), “A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics”, Digital Investigation Vol. 29, pp.43-54, 2019. DOI: https://doi.org/10.1145/3230833.3234690 

5. Atwal T.S., Scanlon M., Le-Khac, N-A., (2019) “Shining a Light on Spotlight: Leveraging Apple’s Desktop Search Utility to Recover Deleted File Metadata on macOS”, Digital Investigation Vol. 28 (2), 2019, https://doi.org/10.1016/j.diin.2019.01.019

6. Anda F., Lillis D., Kanta A., Becker B., Bou-Harb E., Le-Khac, N-A., Scanlon M. (2019), “Improving the accuracy of automated facial age estimation to aid CSEM investigations”, Digital Investigation Vol. 28 (2), 2019, http://doi.org/10.1016/j.diin.2019.01.024

 

 

2018

1. Kouwen A., Scanlon M., Choo KKR., Le-Khac, N-A., (2018) “Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services”, Digital Investigation Vol. 26 (1), 2018, pp.S77-S86 (10 pages) DOI: 10.1016/j.diin.2018.04.007 

2. Boucher J., Le-Khac, N-A., (2018) “Forensic Framework to identify local vs synced artefacts”, Digital Investigation Vol. 24 (1) 2018, pp.S68-S75 (8 pages) DOI: 10.1016/j.diin.2018.01.009 

3. Reed A., Scanlon M., Le-Khac, N-A., (2018) “Private Web Browser Forensics: A Case Study on Epic Privacy Browser”, Journal of Information Warfare, Vol. 17 (1), 2018

 

 

2017

1. Van der Horst L., Choo KKR., Le-Khac, N-A. (2017), “Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core”, IEEE Access Vol.5(1), DOI: 10.1109/ACCESS.2017.2759766

2. Nguyen TN.; Cao VL.; Le-Khac, N-A. (2017), “One-Class Collective Anomaly Detection Based on LSTM-RNNs”, Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.10720:73-85. (13 pages) DOI: 10.1007/978-3-662-56266-6

3. Tobin P.; Le-Khac N-A; Kechadi M-T. (2017) “Forensic Analysis of Virtual Hard Drives”. Journal of Association of Digital Forensics, Security and Law, 12(1):47-58 DOI: 10.15394/jdfsl.2017.1438

 

 

2016

1. Barneveld, MV.; M Kechadi-T.; Le-Khac, N-A. (2016) “A Natural Language Processing tool for White Collar crime investigation”. Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.9480:1-22. (22 pages) DOI: 10.1007/978-3-662-49175-1_1

2. Ben Hitchcock; Le-Khac, N-A; Mark Scanlon (2016) “Tiered forensic methodology model for Digital Field Triage by non-¬‐digital evidence specialists”. Digital Investigation, 16:75-85. (11 pages) DOI: 10.1016/j.diin.2016.01.010

3. Faheem, M.; M Kechadi-T.; Le-Khac, N-A. (2016) “A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications”. International Journal of Advanced Computer Science and Applications, Vol 7(1):21-29 (9 pages) DOI: 10.14569/IJACSA.2016.070103

 

 

2015

1. Faheem, M.; M Kechadi-T.; Le-Khac, N-A. (2015) “The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trend”. International Journal of Digital Crime and Forensics, 7 (2):1-19 (19 pages) DOI: 10.4018/ijdcf.2015040101

2. Voorst, RV.; Kechadi, T.; Le-Khac, N-A (2015) “Forensics Acquisition Of Imvu: A Case Study”. Journal of Association of Digital Forensics, Security and Law, 10(4):69-78 (10 pages) DOI: 10.15394/jdfsl.2015.1212

3. Prat, L.; Baker, C.; Le-Khac, N-A (2015) “MapExif: An Image Scanning and Mapping Tool for Investigators”. International Journal of Digital Crime and Forensics, 7 (2):53-78 (26 pages) DOI: 10.4018/IJDCF.2015040104

4. Le-Khac, N-A.; M Kechadi-T. (2015) “Security Threats of URL Shortening: A User’s Perspective”. Journal of Advances in Computer Networks, 3(3):213-219 (7 pages) DOI: 10.7763/JACN.2015.V3.169

 

 

International peer-reviewed conferences

2023

1.  Nicholls J., Kuppa A. and Le-Khac N-A. (2023),  “FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification”, ACSAC ’23: Proceedings of the 39th Annual Computer Security Applications Conference, December 2023, TX, USA, Pages 324–336, https://doi.org/10.1145/3627106.3627200

2.  Nguyen, D.H., Tran, N.K., Le-Khac, N-A. (2023). “A Siamese-Based Approach for Network Intrusion Detection Systems in Software-Defined Networks”. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2023. Communications in Computer and Information Science, vol 1925. Springer, Singapore. https://doi.org/10.1007/978-981-99-8296-7_14

3. Nguyen, DA., Pham, C., Argent, R., Caulfield, B., Le-Khac, NA. (2023). Towards a New Multi-tasking Learning Approach for Human Fall Detection. In: Nguyen, N.T., Le-Minh, H., Huynh, CP., Nguyen, QV. (eds) The 12th Conference on Information Technology and Its Applications. CITA 2023. Lecture Notes in Networks and Systems, vol 734. Springer, Cham. https://doi.org/10.1007/978-3-031-36886-8_5

4.  Ngo, H.Q., Nguyen, H.D., Le-Khac, NA. (2023). Building Legal Knowledge Map Repository with NLP Toolkits. In: Nguyen, N.T., Le-Minh, H., Huynh, CP., Nguyen, QV. (eds) The 12th Conference on Information Technology and Its Applications. CITA 2023. Lecture Notes in Networks and Systems, vol 734. Springer, Cham. https://doi.org/10.1007/978-3-031-36886-8_3

5.  Nicholls J., Kuppa A. and Le-Khac N-A. (2023), “SoK: The Next Phase of Identifying Illicit Activity in Bitcoin,” 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dubai, United Arab Emirates, 2023, pp. 1-10, doi: 10.1109/ICBC56567.2023.10174963.

 

2022

1.  Ngo Q-H., Kechadi T., Le-Khac N-A. (2022) “OAK4XAI: Model towards Out-Of-Box EXplainable AI for Digital Agriculture”, 42nd SGAI International Conference on Artificial Intelligence Cambridge, England 13-15 December 2022.

2. Thantilage R., Le-Khac N-A., Kechadi T. (2022) “Towards a privacy, secured and distributed clinical data warehouse architecture”, 9th International Conference on Future Data and Security Engineering, Nov. 20-22, HoChiMinh City, Vietnam. 

3. Buurke R., Le-Khac, N-A. (2022), “Accessing Secure Data on Android Through Application Analysis”, In: Gladyshev, P., Goel, S., James, J., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 441. Springer, Cham. https://doi.org/10.1007/978-3-031-06365-7_6

4. Hewage C. N. L., Vu V., Bertolotto M., Le-Khac N-A. and Laefer D. (2022),  “An index for approximate kNN search of remotely sensed images in Key-Value databases”, in 10th IEEE International Conference on Cloud Engineering 2022 

 

2021

1. Kuppa A., Aouad L., Le-Khac, N-A. (2021), “Linking CVE’s to MITRE ATT&CK Techniques”, ARES 2021: The 16th International Conference on Availability, Reliability and Security, August 2021, Pages 1–12, DOI: https://doi.org/10.1145/3465481.3465758

2. Kuppa A., Aouad L., Le-Khac N-A. (2021), “Towards Improving Privacy of Synthetic DataSets”. In: Gruschka N., Antunes L.F.C., Rannenberg K., Drogkaris P. (eds) Privacy Technologies and Policy. APF 2021. Lecture Notes in Computer Science, vol 12703. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-76663-4_6

3. Bromley S.T., Sheppard J., Scanlon M., Le-Khac N-A. (2021) Retracing the Flow of the Stream: Investigating Kodi Streaming Services. In: Goel S., Gladyshev P., Johnson D., Pourzandi M., Majumdar S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 351. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-68734-2_13 

4. Nguyen V. Q., Nguyen V. Hung, Le-Khac, N-A. and Cao V. Loi (2021), “Automatically Estimate Clusters in Autoencoder-based Clustering Model for Anomaly Detection,” 2021 RIVF International Conference on Computing and Communication Technologies (RIVF), 2021, pp. 1-6, DOI: 10.1109/RIVF51545.2021.9642120.

5. Nguyen V. Q., Nguyen V. Hung, Cao V. Loi, Le-Khac, N-A. and N. Shone (2021), “A Robust PCA Feature Selection To Assist Deep Clustering Autoencoder-Based Network Anomaly Detection,” 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), 2021, pp. 335-341, DOI: 10.1109/NICS54270.2021.9701456.

6. Vo, A V; C N Lokugam Hewage; Le-Khac, N-A.; Bertolotto, M; Laefer, D. (2021), “A Parallel Algorithm For Local Point Density Index Computation Of Large Point Clouds”, ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences; Gottingen Vol. VIII-4/W2-2021,  (2021): 75-82. DOI:10.5194/isprs-annals-VIII-4-W2-2021-75-2021

7. ElSayed M., Le-Khac, N-A., Jurcut A. (2021), “A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs”, ARES 2021: The 16th International Conference on Availability, Reliability and Security, August 2021, Pages 1–7, DOI: https://doi.org/10.1145/3465481.3469190

 

 

2020

1. Kuppa A., Aouad L., Le-Khac N-A. (2020), “Effect of Security Controls on Patching Window: A Causal Inference based Approach”, 36th Annual Computer Security Applications Conference (ACSAC), Austin, Texas, USA, December 7-11, 2020 (CORE Rank A, GGS Rand A+)

2. Kaleel M., Le-Khac N-A. (2020), “Towards A New Deep Learning based Approach for the Password Prediction”, 19th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-20), Guangzhou, China, December, 2020 (CORE Rank A)

3. Cents R., Le-Khac N-A. (2020), “Towards A New Approach to Identify WhatsApp Messages”, 19th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-20), Guangzhou, China, December, 2020 (CORE Rank A)

4. Kuppa A., Le-Khac N-A. (2020), Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security, IEEE International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, July 17-20, 2020, pp. 1-8, DOI: 10.1109/IJCNN48605.2020.9206780. (CORE Rank A)

5. Ngo Q. H., Kechadi T. and Le-Khac, N-A. (2020), “OAK: Ontology-based Knowledge Map Model for Digital Agriculture”, 7th International Conference, Future Data and Security Engineering, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Springer Lecture Notes in Computer Science, Vol. 12466, 2020 DOI: 10.1007/978-3-030-63924-2

6. Nguyen V. Q., Cao V. Loi, Le-Khac, N-A., Nguyen V. Hung (2020), “Clustering-based Deep Autoencoders for Network Anomaly Detection”, 7th International Conference, Future Data and Security Engineering, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Springer Lecture Notes in Computer Science, Vol. 12466, 2020 DOI: 10.1007/978-3-030-63924-2

7. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A. (2020), “Network Anomaly Detection Using LSTM Based Autoencoder”, Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’20) November 2020, Pages 37–45 https://doi.org/10.1145/3416013.3426457

7. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A.  (2020), “Detecting Abnormal Traffic in Large-Scale Networks”, IEEE International Symposium on Networks, Computer and Communications (ISNCC 2020), October 20-22, 2020, Montreal, Canada.

9. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A.  (2020), “DDoSNet: A Deep-Learning Model for Detecting Network Attacks”,  IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, Cork, Ireland, June 15-18, arXiv:2006.13981

10. Anda F., Lillis D., Becker B., Le-Khac, N-A., Scanlon M.  (2020), “Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation”, 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, June 02, 2020

 

 

 

2019

1. Diederichsen L., Choo KKR., Le-Khac, N-A. (2019) A Graph Database-Based Approach to Analyze Network Log Files. In: Liu J., Huang X. (eds) Network and System Security. NSS 2019. Lecture Notes in Computer Science, vol 11928. Springer, Cham. https://doi.org/10.1007/978-3-030-36938-5_4

2. Kuppa A., Grzonkowski S., Asghar M.R. and Le-Khac NA., (2019), “Black Box Attacks on Deep Anomaly Detectors”, The 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 26 –29, 2019, DOI: https://doi.org/10.1145/3339252.3339266 (CORE Rank B)

3. Thantilage R., Le-Khac N-A.  (2019), Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019 (CORE Rank A)

4. Kuppa A., Grzonkowski S., and Le-Khac NA., (2019), “Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection”, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019, DOI: 10.1109/TrustCom/BigDataSE.2019.00066. (CORE Rank A)

5. Steiner D., Chen L., Hayes D., Le-Khac N-A.  (2019), “Vehicle Communication within Networks – Investigation and Analysis approach: A Case Study”, The 2019 ADFSL Conference on Digital Forensics, Security and Law, FL. USA, May 2019 

6. Vieyra J., Scanlon M., Le-Khac N-A. (2019) “Solid State Drive Forensics: Where Do We Stand?” In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 259. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-05487-8_8

7. Vo AV., Laefer DF., Trifkovic M., Hewage CNL., Bertolotto M., Le-Khac N-A., Ofterdinger  U.  (2019), “Efficient LiDAR point cloud data encoding for scalable data management within the Hadoop eco-system”, IEEE Big Data 2019, The Next Frontier of Big Data From LiDAR Workshop, LA, USA, December 9-12, DOI: 10.1109/BigData47090.2019.9006044

8. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A. (2019), “Machine Learning Techniques for Detecting Attacks in SDN”, 7th IEEE International Conference on Computer Science and Network Technology, Dalian, China, October 2nd 2020

9. Ngo Q.H., Le-Khac N-A., Kechadi T. (2019) Predicting Soil pH by Using Nearest Fields. In: Bramer M., Petridis M. (eds) Artificial Intelligence XXXVI. SGAI 2019. Lecture Notes in Computer Science, vol 11927. Springer, Cham. https://doi.org/10.1007/978-3-030-34885-4_40

10. M.Vuong Ngo, Le-Khac N-A., M-Tahar Kechadi (2019), Designing and Implementing Data Warehouse for Agricultural Big Data, The 2019 International Congress on Big Data June 25 – June 30, 2019, San Diego, USA, Lecture Notes in Computer Science (LNCS), Springer International Publishing AG, DOI 10.1007/978-3-030-23551-2_1

11. Vandermeer Y., Le-Khac N-A. , M-T. Kechadi, J. Carthy, (2019), Electronic Evidence Discovery, Identification and Preservation: Role of the First Responder and related capacity building challenges, 14th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2019

12. Kuppa A, Grzonkowski S., Le-Khac, N-A.,(2018), “RiskWriter: Predicting Cyber Risk of an Enterprise”. In: Ganapathy V., Jaeger T., Shyamasundar R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science, vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_5

 

 

2018

1. Goudbeek A., Choo KKR., Le-Khac, N-A. (2018), “A Forensic Investigation Framework for Smart Home Environment”, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018 

2. Ngo H., Le-Khac, N-A., and M Kechadi-T. (2018), “Ontology based Approach for Precision Agriculture”, MIWAI 2018 Multi-Disciplinary International Conference on Artificial Intelligence, Springer LNAI, Hanoi, Vietnam, November, 2018 (in publishing)

3. Kuppa A, Grzonkowski S., Le-Khac, N-A.,(2018) “Enabling Trust in Deep Learning Models: A Digital Forensics Case Study”, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018

4. Sayakkara A., Le-Khac, N-A., Scanlon M. (2018), “Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors”, The Second International Workshop on Criminal Use of Information Hiding (CUING), part of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August, 2018. DOI: 10.1145/3230833.3234690

5. Ngo MV., Le-Khac, N-A., and M Kechadi-T. (2018), “An Efficient Data Warehouse for Crop Yield Prediction”, 14th International Conference on Precision Agriculture, Montreal, Canada, June, 2018

6. Vandermeer Y., Kechadi M-T., Carthy J., Le-Khac, N-A. (2018), Forensic Analysis of the exFAT Artefacts, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018

7. Roder A., Choo KKR., Le-Khac, N-A.  (2018), Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018

8. Sayakkara A., Le-Khac, N-A., Scanlon M.  (2018), Electromagnetic Side-Channel A acks: Potential for Progressing Hindered Digital Forensic Analysis, Proceedings of the International Workshop on Speculative Side Channel Analysis (WoSSCA 2018), Amsterdam, The Netherlands, July, 2018 

9. Anda F., Lillis D., Le-Khac N-A., Scanlon M. (2018), Evaluating Automated Facial Age Estimation Techniques for Digital Forensics, 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2018

 

 

2017

1. Nguyen T-A., Le-Khac, N-A., and M Kechadi-T. (2017) “Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems”, 4th International Conference on Future Data and Security Engineering, HoChiMinh City, Vietnam, November 2017

2. Jacobs D., Choo KKR, M Kechadi-T.; Le-Khac, N-A. (2017) “Volkswagen Car Entertainment System Forensics”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 699-705, Sydney, Australia, August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.302

3. Van der Meer W., Choo KKR., Le-Khac, N-A., and M Kechadi-T. (2017) “Investigation and Automating Extraction of Thumbnails Produced by Image viewers”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.355

4. Fleurbaaij D., Scanlon M., Le-Khac, N.A., (2017) “Privileged Data within Digital Evidence”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.307

5. Reed A., Scanlon M., Le-Khac, N.A., (2017) “Forensic Analysis of Epic Privacy Browser on Windows Operating Systems”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

6. Schaefer E., Le-Khac, N-A., Scanlon M. (2017) “Integration of Ether Unpacker into Ragpicker for Plugin-Based Malware Analysis and Identification”,16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

7. Du X., Le-Khac, N-A., Scanlon M. (2017) “Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

8. Anda F., Le-Khac N-A., Scanlon M.  (2017) “Automated Machine Learning-Based Digital Evidence Classification Techniques”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

 

 

2016

1. Bontemps, L.; Cao, V-L.; McDermott, James; Le-Khac N-A (2016) “Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks”, Lecture Notes in Computer Science, Vol. 10018: 141-152 Nov 2016 (11 pages) DOI: 10.1007/978-3-319-48057-2_9

2. Vliet, PV.; M Kechadi-T.; Le-Khac N-A., (2016) “Forensics in Industrial Control system: A Case Study”, Lecture Notes in Computer Science, Vol. 9588: 147-156 June 2016 (10 pages) DOI: 10.1007/978-3-319-40385-4_10

3. Tillekens, A., Le-Khac N-A., and Pham-Thi, T-T.; (2016) “A Bespoke Forensics GIS Tool”, IEEE International Symposium On Mobile Computing, Wireless Networks, and Security, Nevada, USA, Dec 2016. (6 pages) DOI: 10.1109/CSCI.2016.0189

4. Bendechache, M., Le-Khac N-A., and M Kechadi-T.; (2016) Hierarchical Aggregation Approach for Distributed clustering of spatial datasets, 16th IEEE International Conference on Data Mining (ICDM), Workshops, Barcelona, Spain, Dec 2016 (6 pages) DOI: 10.1109/ICDMW.2016.0158

5. Cao V-L., Le-Khac N-A., O’Neill M, Nicolau M, McDermott J, (2016) “Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data”, Applications of Evolutionary Computation, Lecture Notes in Computer Science, Vol. 9597: p.35-45 March 2016 (11 pages) DOI: 10.1007/978-3-319-31204-0_3

6. R. Gomm R., Le-Khac N-A., M. Scanlon, M-Tahar Kechadi (2016) “Analytical Approach to the Recovery of Data from CCTV File Systems”, The 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany, July 2016 p.117-126 (10 pages)

7. Faheem, M.; M Kechadi-T.; Le-Khac, N-A., (2016) “Toward a new mobile cloud forensic framework” The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845142

8. Ryder, Steven and Le-Khac N-A., (2016) “The End of effective Law Enforcement in the Cloud? — To encrypt, or not to encrypt”, The 9th IEEE International Conference on Cloud Computing, San Francisco, CA USA, June 2016 (4 pages) DOI: 10.1109/CLOUD.2016.0133

9. Tobin, P.; Le-Khac N-A., and M Kechadi-T (2016) “A Lightweight Software Write-blocker for Virtual Machine Forensics”, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845141

10. Nicolls, Vincent; Le-Khac N-A.; Chen,L.; Scanlon M. (2016) IPv6 Security and Forensics, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845143

11. Cushman, I. and Chen L.; Rawat, D. and Le-Khac N-A. (2016), “Designing Hybrid Cloud using OpenStack for Supporting Multimedia with Security and Privacy Concerns”, 9th EAI International Conference on Mobile Multimedia Communications, Xi’an, China, June 18–19, 2016 (6 pages)

12. Tobin, P.; Le-Khac N-A., and M Kechadi-T (2016). ”Forensic Analysis of Virtual Hard Drives” Eleventh International Conference on the Systematic Approaches to Digital Forensics Engineering, Kyoto, Japan, September 2016 (8 pages)

13. Kolenbrander F., Le-Khac N-A., M-T. Kechadi, “Forensic Analysis of ARES GALAXY Peer-To-Peer Network”, 11th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2016 (11 pages)

14. Linke A., Le-Khac N-A., “Control Flow Change in Assembly as a Classifier in Malware Analysis”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473514

15. Bendechache, M.; M Kechadi-T. and Le-Khac N-A.; (2016) “Efficient Large Scale Clustering based on Data Partitioning The 3rd IEEE International Conference on Data Science and Advanced Analytics, Montreal, October 2016 (10 pages)  DOI: 10.1109/DSAA.2016.70

16. Witteman R., Meijer A., Le-Khac N-A., M-T. Kechadi (2016), “Toward a new tool to extract the Evidence from a Memory Card of Mobile phones”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473533

17. Braekt R., Le-Khac N-A., J. Farina, M. Scanlon, M-T. Kechadi,  (2016) “Increasing Digital Investigator Availability Through Efficient Workflow Management And Automation”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473520

 

 

2015

1. Christos Sgaras, M. Tahar Kechadi and Le-Khac N-A, (2015) “Forensics Acquisition and Analysis of instant messaging and VoIP applications”, Lecture Notes in Computer Science, Vol.8915: 188-199 June 2015 (12 pages) DOI: 10.1007/978-3-319-20125-2_16

2. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  “Overview of the Forensic Investigation of Cloud Services”, WCSF 2015 workshop, 10th International Conference on Availability, Reliability and Security,  Toulouse, France, August 24-28, 2015 (10 pages) DOI: 10.1109/ARES.2015.81

3. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  “HTML5 Zero Configuration Covert Channels: Security Risks and Challenges”, The 10th ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015), Florida, USA, May 19 -21, 2015 (16 pages)

4. Hung V. Cao, K. X. Chu, Le-Khac N-A, M-T. Kechadi, D. Laefer and Linh Hong Truong, (2015)  “Toward a new approach for massive LiDAR data processing”, IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, July  6 – 7, 2015, Fuzhou, China (7 pages) DOI: 10.1109/ICSDM.2015.7298040

5. H. Schut, J. Farina, M. Scanlon and Le-Khac N-A, (2015)  “Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps”, The 10th International Workshop on Frontiers in Availability, Reliability and Security FARES 2015, Toulouse, France, August 24-28, 2015, (9 pages) DOI: 10.1109/ARES.2015.77

6. J. Plunkett, M. Tahar Kechadi and Le-Khac N-A, (2015)   “Digital Forensic Investigations in the Cloud A Proposed Approach for Irish Law Enforcement”, The 11th Annual IFIP WG 11.9 International Conference on Digital Forensics Orlando, Florida, USA, January 26 – 28, 2015 (20 pages)