Publications

Book

1.  Le-Khac, Nhien-An; Kim-Kwang Raymond Choo (Eds.) (2020) “Cyber and Digital Forensic Investigations – A Law Enforcement Practitioner’s Perspective”, Springer International Publishing, July 2020, https://doi.org/10.1007/978-3-030-47131-6

2.   Chen, L.; Takabi, H.; Le-Khac, N-A. (Eds.)  (2019) “Security, Privacy, and Digital Forensics in the Cloud”, High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385

 

Book Chapters

1.  Mazzarolo G., Casas J.C.F., Jurcut A.D., Le-Khac N-A. (2021) Protect Against Unintentional Insider Threats: The Risk of an Employee’s Cyber Misconduct on a Social Media Site. In: Weulen Kranenbarg M., Leukfeldt R. (eds) Cybercrime in Context. Crime and Justice in Digital Society, vol I. Springer, Cham. https://doi.org/10.1007/978-3-030-60527-8_6

2. Alabdulsalam Saad, Duong Trung Q., Choo Kim-Kwang Raymond, Le-Khac, N-A. (2020) “Evidence Identification and Acquisition based on Network Hidden Link in Internet of Things (IoT) Environments”, In: Herrero Á., Cambra C., Urda D., Sedano J., Quintián H., Corchado E. (eds). Advances in Intelligent Systems and Computing, vol 1267. Springer, Cham. https://doi.org/10.1007/978-3-030-57805-3_16

3. Ranul Thantilage, Le-Khac, N-A. (2020), “Forensic Analysis of E-Dating Applications based on iPhone Backups”, In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XVI. Digital Forensics 2020. IFIP Advances in Information and Communication Technology, vol. 589. Springer, Cham. https://doi.org/10.1007/978-3-030-56223-6_12

4.  Vieyra J., Scanlon M., Le-Khac N-A. (2019) “Solid State Drive Forensics: Where Do We Stand?” In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 259. Springer, Cham. https://doi.org/10.1007/978-3-030-05487-8_8

5.  Van de Wiel E.; Scanlon M.; Le-Khac, N-A. (2018) “Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic”, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_11

6. Alabdulsalam Saad, Schaefer Kevin, M-T Kechadi, Le-Khac, N-A. (2018) “Internet of Things Forensics: Challenges and Case Study”, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_3

7.  Warren, C.; El-Sheikh, E.; Le-Khac, N-A. (2017) ‘Privacy Preserving Internet Browsers – Forensic Analysis of Browzar’ In: Daimi K. et al. (Eds.). Computer and Network Security Essentials. New York: Springer Berlin Heidelberg, (18 pages) DOI: https://doi.org/10.1007/978-3-319-58424-9_21

 
International peer-reviewed journals


2021

1. Kuppa A. and Le-Khac, N-A. (2021), “Adversarial XAI Methods in Cybersecurity,” in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4924-4938, 2021, DOI: 10.1109/TIFS.2021.3117075.

2. Nicholls J., Kuppa A. and Le-Khac, N-A. (2021), “Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape,” in IEEE Access, vol. 9, pp. 163965-163986, 2021, DOI: 10.1109/ACCESS.2021.3134076. 

3. Wijnberg D., Le-Khac, N-A. (2021), “Identifying interception possibilities for WhatsApp communication”, Forensic Science International: Digital Investigation, Volume 38, Supplement, 2021, 301132, DOI: https://doi.org/10.1016/j.fsidi.2021.301132.

4. Schipper G.C, Seelt R., Le-Khac, N-A. (2021),”Forensic analysis of Matrix protocol and Riot.im application”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301118, DOI: https://doi.org/10.1016/j.fsidi.2021.301118.

5. Ngo Q. H., Kechadi T. and Le-Khac, N-A. (2021), “Domain Specific Entity Recognition with Semantic-Based Deep Learning Approach,” in IEEE Access, vol. 9, pp. 152892-152902, 2021, DOI: 10.1109/ACCESS.2021.3128178.

6. Serhal C., and Le-Khac, N-A. (2021), “Machine learning based approach to analyze file meta data for smart phone file triage”, Forensic Science International: Digital Investigation, Volume 37, Supplement, 2021, 301194, DOI: https://doi.org/10.1016/j.fsidi.2021.301194.

7. Sayakkara A. P. and Le-Khac, N-A. (2021), “Electromagnetic Side-Channel Analysis for IoT Forensics: Challenges, Framework, and Datasets,” in IEEE Access, vol. 9, pp. 113585-113598, 2021, DOI: 10.1109/ACCESS.2021.3104525.

8. Sester J., Hayes D., Scanlon M., Le-Khac, N-A. (2021),” A comparative study of support vector machine and neural networks for file type identification using n-gram analysis”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301121, DOI: https://doi.org/10.1016/j.fsidi.2021.301121.

9. Sayakkara A. P. and Le-Khac, N-A. (2021), “Forensic Insights From Smartphones Through Electromagnetic Side-Channel Analysis,” in IEEE Access, vol. 9, pp. 13237-13247, 2021, doi: 10.1109/ACCESS.2021.3051921.

10. Jennings M.R, Turner C., Bond R.R, Kennedy A., Thantilage A., Kechadi, T., Le-Khac, N-A., McLaughlin J., Finlay D.D. (2021),”Code-free cloud computing service to facilitate rapid biomedical digital signal processing and algorithm development”, Computer Methods and Programs in Biomedicine, Volume 211, 2021, 106398, DOI: https://doi.org/10.1016/j.cmpb.2021.106398.

11. Le Q., Miralles-Pechuán L., Sayakkara A., Le-Khac, N-A., Scanlon M. (2021), “Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis”, Forensic Science International: Digital Investigation, Volume 39, 2021, 301308, DOI: https://doi.org/10.1016/j.fsidi.2021.301308.

12. ElSayed M., Le-Khac, N-A., Albahar M.A., Jurcut A. (2021), “A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique”, Journal of Network and Computer Applications, Volume 191, 2021, 103160, DOI: https://doi.org/10.1016/j.jnca.2021.103160.

13. Anda F., Dixon E., Bou-Harb E. , Le-Khac, N-A., Scanlon M. (2021),”Vec2UAge: Enhancing underage age estimation performance through facial embeddings”, Forensic Science International: Digital Investigation, Volume 36, Supplement, 2021, 301119, DOI: https://doi.org/10.1016/j.fsidi.2021.301119.

14. ElSayed M., Le-Khac, N-A., Jurcut A. (2021), “Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics],” in IEEE Security & Privacy, vol. 19, no. 1, pp. 90-94, Jan.-Feb. 2021, doi: 10.1109/MSEC.2020.3037448.

15. Ngo, V.M., Helmer, S., Le-Khac, N-A. et al. (2021), “Structural textile pattern recognition and processing based on hypergraphs”. Inf Retrieval J 24, 137–173 (2021). https://doi.org/10.1007/s10791-020-09384-y

 

2020

16. Le-Khac, N-A., Jacobs D. , Nijhoff J., Bertens K., Kim-Kwang Raymond Choo, (2020) “Smart Vehicle Forensics: Challenges and Case Study”, Future Generation Computer Systems, Volume 109, 2020, Pages 500-510, DOI: https://doi.org/10.1016/j.future.2018.05.081. 

17. Tran H-N., Le-Khac, N-A., Kechadi M-T. (2020), “Lightweight privacy-Preserving data classification”, Computers & Security, Volume 97, 2020, 101835, DOI: https://doi.org/10.1016/j.cose.2020.101835.

18. Hayes D., Cappa F., Le-Khac, N-A. (2020), “An effective approach to mobile device management: Security and privacy issues associated with mobile applications”, Digital Business, Volume 1, Issue 1, 2020, 100001, DOI: https://doi.org/10.1016/j.digbus.2020.100001.

19. Jurcut, A., Niculcea, T., Ranaweera, P. Le-Khac, N-A. (2020), “Security Considerations for Internet of Things: A Survey”. SN COMPUT. SCI. 1, 193 (2020). DOI: https://doi.org/10.1007/s42979-020-00201-3

20. Koerhuis W., Kechadi T., Le-Khac N-A. (2020), “Forensic analysis of privacy-oriented cryptocurrencies”, Forensic Science International: Digital Investigation, Volume 33, 2020, 200891, DOI: https://doi.org/10.1016/j.fsidi.2019.200891.

21. ElSayed M., Le-Khac, N-A., Jurcut A. (2020), “InSDN: A Novel SDN Intrusion Dataset,” in IEEE Access, vol. 8, pp. 165263-165284, 2020, doi: 10.1109/ACCESS.2020.3022633.

22. Sayakkara A., Le-Khac, N-A., Scanlon M. (2020), “Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework”, Forensic Science International: Digital Investigation, Volume 33, Supplement, 2020, 301003, DOI: https://doi.org/10.1016/j.fsidi.2020.301003.

23. Sayakkara A., Miralles-Pechuán L., Le-Khac, N-A., Scanlon M. (2020), “Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection”, Forensic Science International: Digital Investigation, Volume 32, Supplement, 2020, 300927, DOI: https://doi.org/10.1016/j.fsidi.2020.300927.

24. Sayakkara A., Le-Khac, N-A., Scanlon M. (2020), “EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis”, Forensic Science International: Digital Investigation, Elsevier, March 2020, https://doi.org/10.1016/j.fsidi.2020.300907

25. Anda F., Le-Khac, N-A., Scanlon M. (2020), “DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation”, Forensic Science International: Digital Investigation, Volume 32, Supplement, 2020, 300921, DOI: https://doi.org/10.1016/j.fsidi.2020.300921.

26. Ngo V. M., Le-Khac, N-A., Kechadi M-T. (2020), “Data Warehouse and Decision Support on Integrated Crop Big Data”, International Journal of Business Process Integration and Management,  Vol. 10(1), 2020 pp. 17-28, DOI: https://doi.org/10.1504/IJBPIM.2020.113115

27. Vo AV., Laefer DF., Trifkovic M., Hewage CNL., Bertolotto M., Le-Khac N-A., Ofterdinger  U. (2020), “A Highly Scalable Data Management System For Point Cloud And Full Waveform Lidar Data”, The International Archives of Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 43, pp. 507-512, 2020, DOI:10.5194/isprs-archives-XLIII-B4-2020-507-2020

 

2019

28. Zollner S., Choo K-K.R. and Le-Khac N-A. (2019), “An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems,” in IEEE Access, vol. 7, pp. 158250-158263, 2019, doi: 10.1109/ACCESS.2019.2948774.

29. Nguyen K. K., Duong T. Q., Ngo V. A., Le-Khac N-A and Nguyen L. D. (2019), “Distributed Deep Deterministic Policy Gradient for Power Allocation Control in D2D-Based V2V Communications,” in IEEE Access, vol. 7, pp. 164533-164543, 2019, DOI: 10.1109/ACCESS.2019.2952411.

30. Nguyen K. K., Duong T. Q., Ngo V. A., Le-Khac N-A and Nguyen M. (2019), “Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach,” in IEEE Access, vol. 7, pp. 100480-100490, 2019, DOI: 10.1109/ACCESS.2019.2930115.

31. Sayakkara A., Le-Khac, N-A., Scanlon M. (2019), “A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics”, Digital Investigation Vol. 29, pp.43-54, 2019. DOI: https://doi.org/10.1145/3230833.3234690 

32. Atwal T.S., Scanlon M., Le-Khac, N-A., (2019) “Shining a Light on Spotlight: Leveraging Apple’s Desktop Search Utility to Recover Deleted File Metadata on macOS”, Digital Investigation Vol. 28 (2), 2019, https://doi.org/10.1016/j.diin.2019.01.019

33. Anda F., Lillis D., Kanta A., Becker B., Bou-Harb E., Le-Khac, N-A., Scanlon M. (2019), “Improving the accuracy of automated facial age estimation to aid CSEM investigations”, Digital Investigation Vol. 28 (2), 2019, http://doi.org/10.1016/j.diin.2019.01.024


 

2018

34. Kouwen A., Scanlon M., Choo KKR., Le-Khac, N-A., (2018) “Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services”, Digital Investigation Vol. 26 (1), 2018, pp.S77-S86 (10 pages) DOI: 10.1016/j.diin.2018.04.007 

35. Boucher J., Le-Khac, N-A., (2018) “Forensic Framework to identify local vs synced artefacts”, Digital Investigation Vol. 24 (1) 2018, pp.S68-S75 (8 pages) DOI: 10.1016/j.diin.2018.01.009 

36. Reed A., Scanlon M., Le-Khac, N-A., (2018) “Private Web Browser Forensics: A Case Study on Epic Privacy Browser”, Journal of Information Warfare, Vol. 17 (1), 2018

 


2017

37. Van der Horst L., Choo KKR., Le-Khac, N-A. (2017), “Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core”, IEEE Access Vol.5(1), DOI: 10.1109/ACCESS.2017.2759766

38. Nguyen TN.; Cao VL.; Le-Khac, N-A. (2017), “One-Class Collective Anomaly Detection Based on LSTM-RNNs”, Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.10720:73-85. (13 pages) DOI: 10.1007/978-3-662-56266-6

39. Tobin P.; Le-Khac N-A; Kechadi M-T. (2017) “Forensic Analysis of Virtual Hard Drives”. Journal of Association of Digital Forensics, Security and Law, 12(1):47-58 DOI: 10.15394/jdfsl.2017.1438


 

2016

40. Barneveld, MV.; M Kechadi-T.; Le-Khac, N-A. (2016) “A Natural Language Processing tool for White Collar crime investigation”. Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.9480:1-22. (22 pages) DOI: 10.1007/978-3-662-49175-1_1

41. Ben Hitchcock; Le-Khac, N-A; Mark Scanlon (2016) “Tiered forensic methodology model for Digital Field Triage by non-¬‐digital evidence specialists”. Digital Investigation, 16:75-85. (11 pages) DOI: 10.1016/j.diin.2016.01.010

42. Faheem, M.; M Kechadi-T.; Le-Khac, N-A. (2016) “A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications”. International Journal of Advanced Computer Science and Applications, Vol 7(1):21-29 (9 pages) DOI: 10.14569/IJACSA.2016.070103


 

2015

43. Faheem, M.; M Kechadi-T.; Le-Khac, N-A. (2015) “The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trend”. International Journal of Digital Crime and Forensics, 7 (2):1-19 (19 pages) DOI: 10.4018/ijdcf.2015040101

44. Voorst, RV.; Kechadi, T.; Le-Khac, N-A (2015) “Forensics Acquisition Of Imvu: A Case Study”. Journal of Association of Digital Forensics, Security and Law, 10(4):69-78 (10 pages) DOI: 10.15394/jdfsl.2015.1212

45. Prat, L.; Baker, C.; Le-Khac, N-A (2015) “MapExif: An Image Scanning and Mapping Tool for Investigators”. International Journal of Digital Crime and Forensics, 7 (2):53-78 (26 pages) DOI: 10.4018/IJDCF.2015040104

46. Le-Khac, N-A.; M Kechadi-T. (2015) “Security Threats of URL Shortening: A User’s Perspective”. Journal of Advances in Computer Networks, 3(3):213-219 (7 pages) DOI: 10.7763/JACN.2015.V3.169



International peer-reviewed conferences

2021

1. Kuppa A., Aouad L., Le-Khac, N-A. (2021), “Linking CVE’s to MITRE ATT&CK Techniques”, ARES 2021: The 16th International Conference on Availability, Reliability and Security, August 2021, Pages 1–12, DOI: https://doi.org/10.1145/3465481.3465758

2. Kuppa A., Aouad L., Le-Khac N-A. (2021), “Towards Improving Privacy of Synthetic DataSets”. In: Gruschka N., Antunes L.F.C., Rannenberg K., Drogkaris P. (eds) Privacy Technologies and Policy. APF 2021. Lecture Notes in Computer Science, vol 12703. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-76663-4_6

3. Bromley S.T., Sheppard J., Scanlon M., Le-Khac N-A. (2021) Retracing the Flow of the Stream: Investigating Kodi Streaming Services. In: Goel S., Gladyshev P., Johnson D., Pourzandi M., Majumdar S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 351. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-68734-2_13 

4.Nguyen V. Q., Nguyen V. Hung, Le-Khac, N-A. and Cao V. Loi (2021), “Automatically Estimate Clusters in Autoencoder-based Clustering Model for Anomaly Detection,” 2021 RIVF International Conference on Computing and Communication Technologies (RIVF), 2021, pp. 1-6, DOI: 10.1109/RIVF51545.2021.9642120.

5. Nguyen V. Q., Nguyen V. Hung, Cao V. Loi, Le-Khac, N-A. and N. Shone (2021), “A Robust PCA Feature Selection To Assist Deep Clustering Autoencoder-Based Network Anomaly Detection,” 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), 2021, pp. 335-341, DOI: 10.1109/NICS54270.2021.9701456.

6. Vo, A V; C N Lokugam Hewage; Le-Khac, N-A.; Bertolotto, M; Laefer, D. (2021), “A Parallel Algorithm For Local Point Density Index Computation Of Large Point Clouds”, ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences; Gottingen Vol. VIII-4/W2-2021,  (2021): 75-82. DOI:10.5194/isprs-annals-VIII-4-W2-2021-75-2021

7. ElSayed M., Le-Khac, N-A., Jurcut A. (2021), “A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs”, ARES 2021: The 16th International Conference on Availability, Reliability and Security, August 2021, Pages 1–7, DOI: https://doi.org/10.1145/3465481.3469190



2020

8. Kuppa A., Aouad L., Le-Khac N-A. (2020), “Effect of Security Controls on Patching Window: A Causal Inference based Approach”, 36th Annual Computer Security Applications Conference (ACSAC), Austin, Texas, USA, December 7-11, 2020 (CORE Rank A, GGS Rand A+)

9. Kaleel M., Le-Khac N-A. (2020), “Towards A New Deep Learning based Approach for the Password Prediction”, 19th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-20), Guangzhou, China, December, 2020 (CORE Rank A)

10. Cents R., Le-Khac N-A. (2020), “Towards A New Approach to Identify WhatsApp Messages”, 19th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-20), Guangzhou, China, December, 2020 (CORE Rank A)

11. Kuppa A., Le-Khac N-A. (2020), Black Box Attacks on Explainable Artificial Intelligence (XAI) methods in Cyber Security, IEEE International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, July 17-20, 2020, pp. 1-8, DOI: 10.1109/IJCNN48605.2020.9206780. (CORE Rank A)

12. Ngo Q. H., Kechadi T. and Le-Khac, N-A. (2020), “OAK: Ontology-based Knowledge Map Model for Digital Agriculture”, 7th International Conference, Future Data and Security Engineering, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Springer Lecture Notes in Computer Science, Vol. 12466, 2020 DOI: 10.1007/978-3-030-63924-2

13. Nguyen V. Q., Cao V. Loi, Le-Khac, N-A., Nguyen V. Hung (2020), “Clustering-based Deep Autoencoders for Network Anomaly Detection”, 7th International Conference, Future Data and Security Engineering, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Springer Lecture Notes in Computer Science, Vol. 12466, 2020 DOI: 10.1007/978-3-030-63924-2

14. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A. (2020), “Network Anomaly Detection Using LSTM Based Autoencoder”, Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet’20) November 2020, Pages 37–45 https://doi.org/10.1145/3416013.3426457

15. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A.  (2020), “Detecting Abnormal Traffic in Large-Scale Networks”, IEEE International Symposium on Networks, Computer and Communications (ISNCC 2020), October 20-22, 2020, Montreal, Canada.

16. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A.  (2020), “DDoSNet: A Deep-Learning Model for Detecting Network Attacks”,  IEEE World of Wireless, Mobile and Multimedia networks (WoWMoM) 2020, Cork, Ireland, June 15-18, arXiv:2006.13981

17. Anda F., Lillis D., Becker B., Le-Khac, N-A., Scanlon M.  (2020), “Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation”, 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, June 02, 2020



2019

18. Diederichsen L., Choo KKR., Le-Khac, N-A. (2019) A Graph Database-Based Approach to Analyze Network Log Files. In: Liu J., Huang X. (eds) Network and System Security. NSS 2019. Lecture Notes in Computer Science, vol 11928. Springer, Cham. https://doi.org/10.1007/978-3-030-36938-5_4

19. Kuppa A., Grzonkowski S., Asghar M.R. and Le-Khac NA., (2019), “Black Box Attacks on Deep Anomaly Detectors”, The 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 26 –29, 2019, DOI: https://doi.org/10.1145/3339252.3339266 (CORE Rank B)

20. Thantilage R., Le-Khac N-A.  (2019), Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019 (CORE Rank A)

21. Kuppa A., Grzonkowski S., and Le-Khac NA., (2019), “Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection”, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019, DOI: 10.1109/TrustCom/BigDataSE.2019.00066. (CORE Rank A)

22. Steiner D., Chen L., Hayes D., Le-Khac N-A.  (2019), “Vehicle Communication within Networks – Investigation and Analysis approach: A Case Study”, The 2019 ADFSL Conference on Digital Forensics, Security and Law, FL. USA, May 2019 

23. Vieyra J., Scanlon M., Le-Khac N-A. (2019) “Solid State Drive Forensics: Where Do We Stand?” In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 259. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-05487-8_8

24. Vo AV., Laefer DF., Trifkovic M., Hewage CNL., Bertolotto M., Le-Khac N-A., Ofterdinger  U.  (2019), “Efficient LiDAR point cloud data encoding for scalable data management within the Hadoop eco-system”, IEEE Big Data 2019, The Next Frontier of Big Data From LiDAR Workshop, LA, USA, December 9-12, DOI: 10.1109/BigData47090.2019.9006044

25. ElSayed M., Le-Khac, N-A., Dev S., Jurcut A. (2019), “Machine Learning Techniques for Detecting Attacks in SDN”, 7th IEEE International Conference on Computer Science and Network Technology, Dalian, China, October 2nd 2020

26. Ngo Q.H., Le-Khac N-A., Kechadi T. (2019) Predicting Soil pH by Using Nearest Fields. In: Bramer M., Petridis M. (eds) Artificial Intelligence XXXVI. SGAI 2019. Lecture Notes in Computer Science, vol 11927. Springer, Cham. https://doi.org/10.1007/978-3-030-34885-4_40

27. M.Vuong Ngo, Le-Khac N-A., M-Tahar Kechadi (2019), Designing and Implementing Data Warehouse for Agricultural Big Data, The 2019 International Congress on Big Data June 25 – June 30, 2019, San Diego, USA, Lecture Notes in Computer Science (LNCS), Springer International Publishing AG, DOI 10.1007/978-3-030-23551-2_1

28. Vandermeer Y., Le-Khac N-A. , M-T. Kechadi, J. Carthy, (2019), Electronic Evidence Discovery, Identification and Preservation: Role of the First Responder and related capacity building challenges, 14th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2019

29. Kuppa A, Grzonkowski S., Le-Khac, N-A.,(2018), “RiskWriter: Predicting Cyber Risk of an Enterprise”. In: Ganapathy V., Jaeger T., Shyamasundar R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science, vol 11281. Springer, Cham. https://doi.org/10.1007/978-3-030-05171-6_5

 


2018

30. Goudbeek A., Choo KKR., Le-Khac, N-A. (2018), “A Forensic Investigation Framework for Smart Home Environment”, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018 

31. Ngo H., Le-Khac, N-A., and M Kechadi-T. (2018), “Ontology based Approach for Precision Agriculture”, MIWAI 2018 Multi-Disciplinary International Conference on Artificial Intelligence, Springer LNAI, Hanoi, Vietnam, November, 2018 (in publishing)

32. Kuppa A, Grzonkowski S., Le-Khac, N-A.,(2018) “Enabling Trust in Deep Learning Models: A Digital Forensics Case Study”, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018

33. Sayakkara A., Le-Khac, N-A., Scanlon M. (2018), “Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors”, The Second International Workshop on Criminal Use of Information Hiding (CUING), part of the 13th International Conference on Availability, Reliability and Security (ARES 2018), Hamburg, Germany, August, 2018. DOI: 10.1145/3230833.3234690

34. Ngo MV., Le-Khac, N-A., and M Kechadi-T. (2018), “An Efficient Data Warehouse for Crop Yield Prediction”, 14th International Conference on Precision Agriculture, Montreal, Canada, June, 2018

35. Vandermeer Y., Kechadi M-T., Carthy J., Le-Khac, N-A. (2018), Forensic Analysis of the exFAT Artefacts, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018

36. Roder A., Choo KKR., Le-Khac, N-A.  (2018), Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018

37. Sayakkara A., Le-Khac, N-A., Scanlon M.  (2018), Electromagnetic Side-Channel A acks: Potential for Progressing Hindered Digital Forensic Analysis, Proceedings of the International Workshop on Speculative Side Channel Analysis (WoSSCA 2018), Amsterdam, The Netherlands, July, 2018 

38. Anda F., Lillis D., Le-Khac N-A., Scanlon M. (2018), Evaluating Automated Facial Age Estimation Techniques for Digital Forensics, 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2018

 


2017

39. Nguyen T-A., Le-Khac, N-A., and M Kechadi-T. (2017) “Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems”, 4th International Conference on Future Data and Security Engineering, HoChiMinh City, Vietnam, November 2017

40. Jacobs D., Choo KKR, M Kechadi-T.; Le-Khac, N-A. (2017) “Volkswagen Car Entertainment System Forensics”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 699-705, Sydney, Australia, August 2017, DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.302

41. Van der Meer W., Choo KKR., Le-Khac, N-A., and M Kechadi-T. (2017) “Investigation and Automating Extraction of Thumbnails Produced by Image viewers”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.355

42. Fleurbaaij D., Scanlon M., Le-Khac, N.A., (2017) “Privileged Data within Digital Evidence”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.307

43. Reed A., Scanlon M., Le-Khac, N.A., (2017) “Forensic Analysis of Epic Privacy Browser on Windows Operating Systems”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

44. Schaefer E., Le-Khac, N-A., Scanlon M. (2017) “Integration of Ether Unpacker into Ragpicker for Plugin-Based Malware Analysis and Identification”,16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

45. Du X., Le-Khac, N-A., Scanlon M. (2017) “Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

46. Anda F., Le-Khac N-A., Scanlon M.  (2017) “Automated Machine Learning-Based Digital Evidence Classification Techniques”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017

 


2016

47. Bontemps, L.; Cao, V-L.; McDermott, James; Le-Khac N-A (2016) “Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks”, Lecture Notes in Computer Science, Vol. 10018: 141-152 Nov 2016 (11 pages) DOI: 10.1007/978-3-319-48057-2_9

48. Vliet, PV.; M Kechadi-T.; Le-Khac N-A., (2016) “Forensics in Industrial Control system: A Case Study”, Lecture Notes in Computer Science, Vol. 9588: 147-156 June 2016 (10 pages) DOI: 10.1007/978-3-319-40385-4_10

49. Tillekens, A., Le-Khac N-A., and Pham-Thi, T-T.; (2016) “A Bespoke Forensics GIS Tool”, IEEE International Symposium On Mobile Computing, Wireless Networks, and Security, Nevada, USA, Dec 2016. (6 pages) DOI: 10.1109/CSCI.2016.0189

50. Bendechache, M., Le-Khac N-A., and M Kechadi-T.; (2016) Hierarchical Aggregation Approach for Distributed clustering of spatial datasets, 16th IEEE International Conference on Data Mining (ICDM), Workshops, Barcelona, Spain, Dec 2016 (6 pages) DOI: 10.1109/ICDMW.2016.0158

51. Cao V-L., Le-Khac N-A., O’Neill M, Nicolau M, McDermott J, (2016) “Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data”, Applications of Evolutionary Computation, Lecture Notes in Computer Science, Vol. 9597: p.35-45 March 2016 (11 pages) DOI: 10.1007/978-3-319-31204-0_3

52. R. Gomm R., Le-Khac N-A., M. Scanlon, M-Tahar Kechadi (2016) “Analytical Approach to the Recovery of Data from CCTV File Systems”, The 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany, July 2016 p.117-126 (10 pages)

53. Faheem, M.; M Kechadi-T.; Le-Khac, N-A., (2016) “Toward a new mobile cloud forensic framework” The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845142

54. Ryder, Steven and Le-Khac N-A., (2016) “The End of effective Law Enforcement in the Cloud? — To encrypt, or not to encrypt”, The 9th IEEE International Conference on Cloud Computing, San Francisco, CA USA, June 2016 (4 pages) DOI: 10.1109/CLOUD.2016.0133

55. Tobin, P.; Le-Khac N-A., and M Kechadi-T (2016) “A Lightweight Software Write-blocker for Virtual Machine Forensics”, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845141

56. Nicolls, Vincent; Le-Khac N-A.; Chen,L.; Scanlon M. (2016) IPv6 Security and Forensics, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 (6 pages) DOI: 10.1109/INTECH.2016.7845143

57. Cushman, I. and Chen L.; Rawat, D. and Le-Khac N-A. (2016), “Designing Hybrid Cloud using OpenStack for Supporting Multimedia with Security and Privacy Concerns”, 9th EAI International Conference on Mobile Multimedia Communications, Xi’an, China, June 18–19, 2016 (6 pages)

58. Tobin, P.; Le-Khac N-A., and M Kechadi-T (2016). ”Forensic Analysis of Virtual Hard Drives” Eleventh International Conference on the Systematic Approaches to Digital Forensics Engineering, Kyoto, Japan, September 2016 (8 pages)

59. Kolenbrander F., Le-Khac N-A., M-T. Kechadi, “Forensic Analysis of ARES GALAXY Peer-To-Peer Network”, 11th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2016 (11 pages)

60. Linke A., Le-Khac N-A., “Control Flow Change in Assembly as a Classifier in Malware Analysis”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473514

61. Bendechache, M.; M Kechadi-T. and Le-Khac N-A.; (2016) “Efficient Large Scale Clustering based on Data Partitioning The 3rd IEEE International Conference on Data Science and Advanced Analytics, Montreal, October 2016 (10 pages)  DOI: 10.1109/DSAA.2016.70

62. Witteman R., Meijer A., Le-Khac N-A., M-T. Kechadi (2016), “Toward a new tool to extract the Evidence from a Memory Card of Mobile phones”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473533

63. Braekt R., Le-Khac N-A., J. Farina, M. Scanlon, M-T. Kechadi,  (2016) “Increasing Digital Investigator Availability Through Efficient Workflow Management And Automation”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 (6 pages) DOI: 10.1109/ISDFS.2016.7473520

 


2015

64. Christos Sgaras, M. Tahar Kechadi and Le-Khac N-A, (2015) “Forensics Acquisition and Analysis of instant messaging and VoIP applications”, Lecture Notes in Computer Science, Vol.8915: 188-199 June 2015 (12 pages) DOI: 10.1007/978-3-319-20125-2_16

65. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  “Overview of the Forensic Investigation of Cloud Services”, WCSF 2015 workshop, 10th International Conference on Availability, Reliability and Security,  Toulouse, France, August 24-28, 2015 (10 pages) DOI: 10.1109/ARES.2015.81

66. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  “HTML5 Zero Configuration Covert Channels: Security Risks and Challenges”, The 10th ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015), Florida, USA, May 19 -21, 2015 (16 pages)

67. Hung V. Cao, K. X. Chu, Le-Khac N-A, M-T. Kechadi, D. Laefer and Linh Hong Truong, (2015)  “Toward a new approach for massive LiDAR data processing”, IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, July  6 – 7, 2015, Fuzhou, China (7 pages) DOI: 10.1109/ICSDM.2015.7298040

68. H. Schut, J. Farina, M. Scanlon and Le-Khac N-A, (2015)  “Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps”, The 10th International Workshop on Frontiers in Availability, Reliability and Security FARES 2015, Toulouse, France, August 24-28, 2015, (9 pages) DOI: 10.1109/ARES.2015.77

69. J. Plunkett, M. Tahar Kechadi and Le-Khac N-A, (2015)   “Digital Forensic Investigations in the Cloud A Proposed Approach for Irish Law Enforcement”, The 11th Annual IFIP WG 11.9 International Conference on Digital Forensics Orlando, Florida, USA, January 26 – 28, 2015 (20 pages)