Dr Nhien-An Le-Khac

Lecturer/Assistant Professor

 email: an.lekhac@ucd.ie
 Phone: +353 1 7162929
 Room: A1.05 

   Computer Science Building
   Belfield 
   Dublin 4

 

 Full Profile

Cyber Security, Cybercrime Investigation, Digital Forensics, Cloud Computing, Big Data Analytics, Distributed Data Mining

Selected publications (since 2014), for the full list, please see UCD RMS Publication list or Google Scholar Profile 

 

Book

  1. Chen, L.; Takabi, H.; Le-Khac, N-A. (Eds.)  (2019) “Security, Privacy, and Digital Forensics in the Cloud”, High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385

Proceedings

  1. Scanlon M.; Le-Khac, N-A. (Eds.) (2017), Proceedings of the "16th European Conference on Cyber Warfare and Security", ACPI Ltd., June , 2017,  Link

Book Chapters

  1. Van de Wiel E.; Scanlon M.; Le-Khac, N-A. (2018) Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_11
  2. Saad Alabdulsalam, Kevin Schaefer, M-T Kechadi, Le-Khac, N-A. (2018) Internet of Things Forensics: Challenges and Case Study, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_3
  3. Warren, C.; El-Sheikh, E.; Le-Khac, N-A. (2017) ‘Privacy Preserving Internet Browsers – Forensic Analysis of Browzar’ In: Daimi K. et al. (Eds.). Computer and Network Security Essentials. New York: Springer Berlin Heidelberg, DOI: https://doi.org/10.1007/978-3-319-58424-9_21
  4. Le-Khac N-A., Roeloffs M., Kechadi T. (2014) ‘Forensic Analysis of the TomTom Navigation Application’. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics X. Digital Forensics 2014. IFIP Advances in Information and Communication Technology, Vol. 433. Springer, Berlin, Heidelberg., pp.267-276, DOI: https://doi.org/10.1007/978-3-662-44952-3_18

 
International peer-reviewed journals

  1.  Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac, (2019) Shining a Light on Spotlight: Leveraging Apple's Desktop Search Utility to Recover Deleted File Metadata on macOS, Digital Investigation Vol. 28 (2), 2019
  2. Nhien-An Le-Khac, Daniel Jacobs, John Nijhoff, Karsten Bertens, Kim-Kwang Raymond Choo, (2018) Smart Vehicle Forensics: Challenges and Case Study, Future Generation of Computer Systems, Elsevier, July 2018, DOI: https://doi.org/10.1016/j.future.2018.05.081
  3. Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, (2018) Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services, Digital Investigation Vol. 26 (1), 2018, DOI: https://doi.org/10.1016/j.diin.2018.04.007
  4.  Jacques Boucher, Nhien-An Le-Khac (2018) Forensic Framework to identify local vs synced artefacts, Digital Investigation Vol. 24 (1), 2018, DOI: https://doi.org/10.1016/j.diin.2018.01.009
  5.   Luuc Van der Horst, Kim-Kwang Raymond Choo, Nhien-An Le-Khac (2017), Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core, IEEE Access Vol.5(1), DOI: https://doi.org/10.1109/ACCESS.2017.2759766
  6. Nga Nguyen Thi, Van Loi Cao, Nhien-An Le-Khac (2017), One-Class Collective Anomaly Detection Based on LSTM-RNNs, Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.10720:73-85. DOI: https://doi.org/10.1007/978-3-662-56266-6
  7. Patrick Tobin, Nhien-An Le-Khac, Tahar Kechadi (2017) ‘Forensic Analysis of Virtual Hard Drives’. Journal of Association of Digital Forensics, Security and Law, 12(1):47-58 DOI: https://doi.org/10.15394/jdfsl.2017.1438
  8. Barneveld, MV.; Kechadi, M-T.; Le-Khac, N-A (2016) 'A Natural Language Processing tool for White Collar crime investigation'. Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.9480:1-22. DOI: https://doi.org/10.1007/978-3-662-49175-1_1
  9. Hitchcock, Ben; Le-Khac, N-A; Scanlon, Mark (2016) 'Tiered forensic methodology model for Digital Field Triage by non-­‐digital evidence specialists'. Digital Investigation, 16:75-85. (11 pages) DOI: https://doi.org/10.1016/j.diin.2016.01.010
  10. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A. (2016) ‘A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications’. International Journal of Advanced Computer Science and Applications, Vol 7(1):21-29. DOI: http://dx.doi.org/10.14569/IJACSA.2016.070103
  11. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A. (2015) 'The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trend'. International Journal of Digital Crime and Forensics, 7 (2):1-19  DOI: http://dx.doi.org/10.4018/ijdcf.2015040101
  12. Voorst, RV.; Kechadi, T.; Le-Khac, N-A (2015) 'Forensics Acquisition Of Imvu: A Case Study'. Journal of Association of Digital Forensics, Security and Law, 10(4):69-78  DOI: https://doi.org/10.15394/jdfsl.2015.1212
  13. Prat, L.; Baker, C.; Le-Khac, N-A (2015) 'MapExif: An Image Scanning and Mapping Tool for Investigators'. International Journal of Digital Crime and Forensics, 7 (2):53-78 DOI: https://doi.org/10.4018/IJDCF.2015040104
  14. Le-Khac, N-A.; Kechadi, M-T. (2015) ‘Security Threats of URL Shortening: A User's Perspective’. Journal of Advances in Computer Networks, 3(3):213-219  DOI: http://dx.doi.org/10.7763/JACN.2015.V3.169
  15. Faheem, F. Le-Khac, N-A. and Kechadi, M-T.  (2014) “Smartphone Forensics Analysis: A Case Study for Obtaining Root Access of an Android SamSung S3 Device and Analyse the Image without an Expensive Commercial Tool”, Journal of Information Security, 5(3):83-90 DOI: http://dx.doi.org/10.4236/jis.2014.53009
  16. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A., (2014) "An Overview of Cloud Base Application Forensics Tools for Mobile Devices", International Journal of Applied Information Systems,  7(10):7-10 DOI: http://dx.doi.org/10.5120/ijais14-451232
  17. Scanlon, M., Farina, J., Le Khac, N-A. and Kechadi, M-T. (2014) 'Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync'. Journal of Association of Digital Forensics, Security and Law, 9 (2):85-100 DOI: http://dx.doi.org/10.15394/jdfsl.2014.1173

 

International peer-reviewed conferences

  1.  Aditya K., Grzonkowski S., Le-Khac NA. (2018) RiskWriter: Predicting Cyber Risk of an Enterprise. In: Ganapathy V., Jaeger T., Shyamasundar R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science, vol 11281. Springer, Cham, DOI: https://doi.org/10.1007/978-3-030-05171-6_5 
  2. Vieyra J., Scanlon M., Le-Khac NA. (2019) Solid State Drive Forensics: Where Do We Stand?. In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 259. Springer, Cham, DOI:  https://doi.org/10.1007/978-3-030-05487-8_8
  3. Ngo Q.H., Le-Khac NA., Kechadi T. (2018) Ontology Based Approach for Precision Agriculture. In: Kaenampornpan M., Malaka R., Nguyen D., Schwind N. (eds) Multi-disciplinary Trends in Artificial Intelligence. MIWAI 2018. Lecture Notes in Computer Science, vol 11248. Springer, Cham, DOI: https://doi.org/10.1007/978-3-030-03014-8_15
  4. Arnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, A Forensic Investigation Framework for Smart Home Environment, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00201
  5. Aditya Kuppa, Slawomir Grzonkowski, Nhien-An Le-Khac, Enabling Trust in Deep Learning Models: A Digital Forensics Case Study, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00172
  6.  Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon, Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors, The Second International Workshop on Criminal Use of Information Hiding (CUING), part of the 13th International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, August, 2018. DOI: https://doi.org/10.1145/3230833.3234690
  7. M.Vuong Ngo, Nhien-An Le-Khac, M-Tahar Kechadi, An Efficient Data Warehouse for Crop Yield Prediction, 14th International Conference on Precision Agriculture, Montreal, Canada, June, 2018
  8. Yves Vandermeer, M-T. Kechadi, J. Carthy, Nhien-An Le-Khac (2018), Forensic Analysis of the exFAT Artefacts, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018
  9.  Alan Roder, Kim-Kwang Raymond Choo, Nhien-An Le-Khac (2018), Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018
  10. Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon, Electromagnetic Side-Channel A acks: Potential for Progressing Hindered Digital Forensic Analysis, Proceedings of the International Workshop on Speculative Side Channel Analysis (WoSSCA 2018), Amsterdam, The Netherlands, July, 2018
  11. Felix Anda, David Lillis, Nhien-An Le-Khac, Mark Scanlon (2018), Evaluating Automated Facial Age Estimation Techniques for Digital Forensics, 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2018, DOI: https://doi.org/10.1109/SPW.2018.00028
  12. Nguyen TA., Le-Khac NA., Kechadi MT. (2017) Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems. In: Dang T., Wagner R., Küng J., Thoai N., Takizawa M., Neuhold E. (eds) Future Data and Security Engineering. FDSE 2017. Lecture Notes in Computer Science, vol 10646. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-70004-5_24
  13.  Daniel Jacobs, Kim-Kwang Raymond Choo, M-Tahar Kechadi, Nhien-An Le-Khac (2017) “Volkswagen Car Entertainment System Forensics”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 699-705, Sydney, Australia, August 2017, DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.302
  14.  Wybren Van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M-Tahar Kechadi (2017) “Investigation and Automating Extraction of Thumbnails Produced by Image viewers”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.355
  15. Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac (2017) “Privileged Data within Digital Evidence”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.307
  16. Malika Bendechache, Nhien-An Le-Khac and M-Tahar Kechadi (2017) “Distributed Spatial Data Clustering as a New Approach for Big Data Analysis”, 15th Australasian Data Mining Conference, Melbourne, 19-20 August 2017
  17. Alan Reed, Mark Scanlon, Nhien-An Le-Khac (2017) “Forensic Analysis of Epic Privacy Browser on Windows Operating Systems”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017
  18. Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon (2017) “Integration of Ether Unpacker into Ragpicker for Plugin-Based Malware Analysis and Identification”,16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017
  19. Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon (2017) “Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017
  20. Felix Anda, Mark Scanlon, Nhien-An Le-Khac (2017) “Automated Machine Learning-Based Digital Evidence Classification Techniques”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017
  21. Bontemps, L.; Cao, V-L.; McDermott, James; Le-Khac N-A (2016) “Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks”, Lecture Notes in Computer Science, Vol. 10018: 141-152 Nov 2016 DOI: https://doi.org/10.1007/978-3-319-48057-2_9
  22. Vliet, PV.; Kechadi, M-T.; Le-Khac N-A., (2016) “Forensics in Industrial Control system: A Case Study”, Lecture Notes in Computer Science, Vol. 9588: 147-156 June 2016  DOI: https://doi.org/10.1007/978-3-319-40385-4_10
  23. Tillekens, A., Le-Khac N-A., and Pham-Thi, T-T.; (2016) “A Bespoke Forensics GIS Tool”, IEEE International Symposium On Mobile Computing, Wireless Networks, and Security, Nevada, USA, Dec 2016. DOI: https://doi.org/10.1109/CSCI.2016.0189
  24. Bendechache, M., Le-Khac N-A., and Kechadi, M-T.; (2016) Hierarchical Aggregation Approach for Distributed clustering of spatial datasets, 16th IEEE International Conference on Data Mining (ICDM), Workshops, Barcelona, Spain, Dec 2016 DOI: https://doi.org/10.1109/ICDMW.2016.0158
  25. Cao V-L., Le-Khac N-A., O'Neill M, Nicolau M, McDermott J, (2016) “Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data”, Applications of Evolutionary Computation, Lecture Notes in Computer Science, Vol. 9597: p.35-45 March 2016  DOI: https://doi.org/10.1007/978-3-319-31204-0_3
  26. R. Gomm R., Le-Khac N-A., , M. Scanlon, M-Tahar Kechadi (2016) “Analytical Approach to the Recovery of Data from CCTV File Systems”, The 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany, July 2016 p.117-126
  27. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A., (2016) “Toward a new mobile cloud forensic framework” The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016  DOI: https://doi.org/10.1109/INTECH.2016.7845142
  28. Ryder, Steven and Le-Khac N-A., (2016) “The End of effective Law Enforcement in the Cloud? -- To encrypt, or not to encrypt”, The 9th IEEE International Conference on Cloud Computing, San Francisco, CA USA, June 2016  DOI: https://doi.org/10.1109/CLOUD.2016.0133
  29. Tobin, P.; Le-Khac N-A., and Kechadi, M-T (2016) “A Lightweight Software Write-blocker for Virtual Machine Forensics”, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 DOI: https://doi.org/10.1109/INTECH.2016.7845141
  30. Nicolls, Vincent; Le-Khac N-A.,; Chen,Lei; Scanlon, Mark (2016) IPv6 Security and Forensics, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016  DOI: https://doi.org/10.1109/INTECH.2016.7845143
  31. Cushman, Isaac and Chen, Lei and Rawat, Danda and Le-Khac N-A. (2016), “Designing Hybrid Cloud using OpenStack for Supporting Multimedia with Security and Privacy Concerns”, 9th EAI International Conference on Mobile Multimedia Communications, Xi'an, China, June 18–19, 2016
  32. Tobin, P.; Le-Khac N-A., and Kechadi, M-T (2016). ”Forensic Analysis of Virtual Hard Drives” Eleventh International Conference on the Systematic Approaches to Digital Forensics Engineering, Kyoto, Japan, September 2016 
  33. F. Kolenbrander, Le-Khac N-A., M-T. Kechadi, (2016) “Forensic Analysis of ARES GALAXY Peer-To-Peer Network”, 11th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2016
  34. A. Linke, Le-Khac N-A., (2016) “Control Flow Change in Assembly as a Classifier in Malware Analysis”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016  DOI: https://doi.org/10.1109/ISDFS.2016.7473514
  35. Bendechache, M.,., Kechadi, M-T. and Le-Khac N-A; (2016) “Efficient Large Scale Clustering based on Data Partitioning The 3rd IEEE International Conference on Data Science and Advanced Analytics, Montreal, October 2016  DOI: https://doi.org/10.1109/DSAA.2016.70
  36. R. Witteman, A. Meijer, Le-Khac N-A., M-T. Kechadi (2016), “Toward a new tool to extract the Evidence from a Memory Card of Mobile phones”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 DOI: https://doi.org/10.1109/ISDFS.2016.7473533
  37. R. Braekt, Le-Khac N-A., J. Farina, M. Scanlon, M-T. Kechadi,  (2016) “Increasing Digital Investigator Availability Through Efficient Workflow Management And Automation”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 DOI: https://doi.org/10.1109/ISDFS.2016.7473520
  38. Christos Sgaras, M. Tahar Kechadi and Le-Khac N-A, (2015) “Forensics Acquisition and Analysis of instant messaging and VoIP applications”, Lecture Notes in Computer Science, Vol.8915: 188-199 June 2015  DOI: https://doi.org/10.1007/978-3-319-20125-2_16
  39.  J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  "Overview of the Forensic Investigation of Cloud Services", WCSF 2015 workshop, 10th International Conference on Availability, Reliability and Security,  Toulouse, France, August 24-28, 2015  DOI: https://doi.org/10.1109/ARES.2015.81
  40. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  "HTML5 Zero Configuration Covert Channels: Security Risks and Challenges", The 10th ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015), Florida, USA, May 19 -21, 2015 
  41. Hung V. Cao, K. X. Chu, Le-Khac N-A, M-T. Kechadi, D. Laefer and Linh Hong Truong, (2015)  "Toward a new approach for massive LiDAR data processing", IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, July  6 - 7, 2015, Fuzhou, China  DOI: https://doi.org/10.1109/ICSDM.2015.7298040
  42. H. Schut, J. Farina, M. Scanlon and Le-Khac N-A, (2015)  "Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps", The 10th International Workshop on Frontiers in Availability, Reliability and Security FARES 2015, Toulouse, France, August 24-28, 2015, DOI: https://doi.org/10.1109/ARES.2015.77
  43. J. Plunkett, M. Tahar Kechadi and Le-Khac N-A, (2015)   “Digital Forensic Investigations in the Cloud A Proposed Approach for Irish Law Enforcement”, The 11th Annual IFIP WG 11.9 International Conference on Digital Forensics Orlando, Florida, USA, January 26 - 28, 2015 
  44. Maarten van Barneveld, Le-Khac N-A and M. Tahar Kechadi (2014), “Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation”, Lecture Notes in Computer Science, Vol. 8860: 29-43 November 2014  DOI: https://doi.org/10.1007/978-3-319-12778-1_3
  45. Mark Scanlon, Jason Farina, Le-Khac N-A and M. Tahar Kechadi, (2014) “Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync”, 6th International Conference on Digital Forensics & Cyber Crime (ICDF2C 2014),  Connecticut, USA, September 18th-20th, 2014  DOI: https://doi.org/10.15394/jdfsl.2014.1173
  46. B. Busstra, M. Tahar Kechadi and , Le-Khac N-A, (2014) “Android and Wireless data-extraction using Wi-Fi”, 4th IEEE international conference on Innovative Computing Technology (INTECH 2014), Luton, UK, August 13th-15th, 2014  DOI: https://doi.org/10.1109/INTECH.2014.6927769