Dr Nhien-An Le-Khac

Lecturer/Assistant Professor

Programme Director of MSc programme in Forensic Computing and Cybercrime Investigation

 Email: an.lekhac@ucd.ie
 Phone: +353 1 7162929
 Room: A1.05 

   Computer Science Building
   Belfield 
   Dublin 4

 

 Full Profile

see UCD RMS Teaching

Module Coordinator:

COMP40100 Computer Forensics

COMP41650 Malware Analysis

COMP41430 Linux for Investigators

COMP47430 Data and Database Forensics

COMP41590 Advanced Computer Forensics

COMP41570 Advanced Scripting

COMP41580 VoIP and Wireless Investigations

COMP47630 OSINT Collection & Analysis

COMP47510 Financial Investigation Techniques - Following the Money

COMP47380 Advanced Malware Investigations

COMP47420 Online Fraud Investigations

COMP47450 Financial Fraud Investigations

COMP47440 Legislation

COMP2005L Networks and Internet Systems

COMP2007L Mobile App Development

COMP40150 Case Study

COMP40160 Research Project

 

Cyber Security, Cybercrime Investigation, Digital Forensics, Cloud Computing, Big Data Analytics, Distributed Data Mining, Adversarial Science

Selected publications (since 2014), for the full list, please see UCD RMS Publication list or Google Scholar Profile 

Book

  1. Chen, L.; Takabi, H.; Le-Khac, N-A. (Eds.)  (2019) “Security, Privacy, and Digital Forensics in the Cloud”, High Education Press, Wiley Inc., April 2019, DOI: https://doi.org/10.1002/9781119053385

 

1119053285.jpg

BookAuthority Best New Digital Forensics Books BookAuthority Best New Network Security Books

 

 

Proceedings

  1. Scanlon M.; Le-Khac, N-A. (Eds.) (2017), Proceedings of the "16th European Conference on Cyber Warfare and Security", ACPI Ltd., June , 2017,  Link

Book Chapters

  1. Van de Wiel E.; Scanlon M.; Le-Khac, N-A. (2018) Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_11
  2. Saad Alabdulsalam, Kevin Schaefer, M-T Kechadi, Le-Khac, N-A. (2018) Internet of Things Forensics: Challenges and Case Study, In: Gilbert, Peterson; Shenoi Sujeet (Eds.). Advances in Digital Forensics XIV. New York: Springer Berlin Heidelberg. DOI: https://doi.org/10.1007/978-3-319-99277-8_3
  3. Warren, C.; El-Sheikh, E.; Le-Khac, N-A. (2017) ‘Privacy Preserving Internet Browsers – Forensic Analysis of Browzar’ In: Daimi K. et al. (Eds.). Computer and Network Security Essentials. New York: Springer Berlin Heidelberg, DOI: https://doi.org/10.1007/978-3-319-58424-9_21
  4. Le-Khac N-A., Roeloffs M., Kechadi T. (2014) ‘Forensic Analysis of the TomTom Navigation Application’. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics X. Digital Forensics 2014. IFIP Advances in Information and Communication Technology, Vol. 433. Springer, Berlin, Heidelberg., pp.267-276, DOI: https://doi.org/10.1007/978-3-662-44952-3_18

 
Peer-reviewed journals

2020

  1. Koerhuis W., Le-Khac, N-A (2020), Digital Investigation (accepted)  (Impact Factor: 2.27, SCI Q1)

2019

  1. Zollner S., Choo K-K R., Le-Khac, N-A (2019) An Automated Live Forensic and Postmortem Analysis tool for Bitcoin on Windows Systems, IEEE Access Vol.7, 2019 DOI: https://doi.org/10.1109/ACCESS.2019.2948774 (Impact Factor: 4.09, SCI Q1) 
  2. Atwal T. S., Scanlon M., Le-Khac, N-A, (2019) Shining a Light on Spotlight: Leveraging Apple's Desktop Search Utility to Recover Deleted File Metadata on macOS, Digital Investigation Vol. 28 (2), 2019, DOI:https://doi.org/10.1016/j.diin.2019.01.019   (Impact Factor: 2.27, SCI Q1)
  3. Sayakkara A., Le-Khac, N-A, Scanlon M. (2019), A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics, Digital Investigation Vol. 29, pp.43-54, 2019. DOI: https://doi.org/10.1145/3230833.3234690  (Impact Factor: 2.27, SCI Q1)
  4. Anda F., Lillis D., Kanta A., Becker B., Bou-Harb E., Le-Khac, N-A, Scanlon M., (2019) Improving the accuracy of automated facial age estimation to aid CSEM investigations, Digital Investigation Vol. 28 (2), 2019. DOI: https://doi.org/10.1016/j.diin.2019.01.024  (Impact Factor: 2.27, SCI Q1)
  5. Sayakkara A., Le-Khac, N-A, Scanlon M. (2019), Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices, Digital Investigation Vol. 30 (2), 2019   (Impact Factor: 2.27, SCI Q1)
  6. Nguyen K. K., Duong Q. Trung, Ngo A. V., Le-Khac, N-A, Nguyen M. N. (2019) Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach,  IEEE Access Vol.7(1), DOI: 10.1109/ACCESS.2019.2930115  (Impact Factor: 4.09, SCI Q1)

2018

  1. Le-Khac, N-A, Jacobs D., Nijhoff J., Bertens K., Choo K-K R., (2018) Smart Vehicle Forensics: Challenges and Case Study, Future Generation of Computer Systems, Elsevier, July 2018, DOI: https://doi.org/10.1016/j.future.2018.05.081   (Impact Factor: 5.67, SCI Q1)
  2. Kouwen A., Scanlon M., Choo K-K R., Le-Khac, N-A, (2018) Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services, Digital Investigation Vol. 26 (1), 2018, DOI: https://doi.org/10.1016/j.diin.2018.04.007  (Impact Factor: 2.27, SCI Q1)
  3. Boucher J., Le-Khac, N-A (2018) Forensic Framework to identify local vs synced artefacts, Digital Investigation Vol. 24 (1), 2018, DOI: https://doi.org/10.1016/j.diin.2018.01.009  (Impact Factor: 2.27, SCI Q1)

2017

  1. Van der Horst L., Choo K-K R., Le-Khac, N-A (2017), Process memory investigation of the Bitcoin Clients Electrum and Bitcoin Core, IEEE Access Vol.5(1), DOI: https://doi.org/10.1109/ACCESS.2017.2759766  (Impact Factor: 4.09, SCI Q1)
  2. Nga Nguyen Thi, Van Loi Cao, Le-Khac, N-A (2017), One-Class Collective Anomaly Detection Based on LSTM-RNNs, Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.10720:73-85. DOI: https://doi.org/10.1007/978-3-662-56266-6  (SCI Q2)
  3. Tobin P. , Le-Khac, N-A, Tahar Kechadi (2017) ‘Forensic Analysis of Virtual Hard Drives’. Journal of Association of Digital Forensics, Security and Law, 12(1):47-58 DOI: https://doi.org/10.15394/jdfsl.2017.1438

2016

  1. Barneveld, MV.; Kechadi, M-T.; Le-Khac, N-A (2016) 'A Natural Language Processing tool for White Collar crime investigation'. Springer Transactions on Large-Scale Data and Knowledge-Centered Systems, LNCS Vol.9480:1-22. DOI: https://doi.org/10.1007/978-3-662-49175-1_1  (SCI Q2)
  2. Hitchcock, Ben; Le-Khac, N-A; Scanlon, Mark (2016) 'Tiered forensic methodology model for Digital Field Triage by non-­‐digital evidence specialists'. Digital Investigation, 16:75-85. (11 pages) DOI: https://doi.org/10.1016/j.diin.2016.01.010  (Impact Factor: 2.27, SCI Q1)
  3. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A. (2016) ‘A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications’. International Journal of Advanced Computer Science and Applications, Vol 7(1):21-29. DOI: http://dx.doi.org/10.14569/IJACSA.2016.070103

2015

  1. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A. (2015) 'The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trend'. International Journal of Digital Crime and Forensics, 7 (2):1-19  DOI: http://dx.doi.org/10.4018/ijdcf.2015040101  (SCI Q4)
  2. Voorst, RV.; Kechadi, T.; Le-Khac, N-A (2015) 'Forensics Acquisition Of Imvu: A Case Study'. Journal of Association of Digital Forensics, Security and Law, 10(4):69-78  DOI: https://doi.org/10.15394/jdfsl.2015.1212
  3. Prat, L.; Baker, C.; Le-Khac, N-A (2015) 'MapExif: An Image Scanning and Mapping Tool for Investigators'. International Journal of Digital Crime and Forensics, 7 (2):53-78 DOI: https://doi.org/10.4018/IJDCF.2015040104  (SCI Q4)
  4. Le-Khac, N-A.; Kechadi, M-T. (2015) ‘Security Threats of URL Shortening: A User's Perspective’. Journal of Advances in Computer Networks, 3(3):213-219  DOI: http://dx.doi.org/10.7763/JACN.2015.V3.169

2014

  1. Faheem, F. Le-Khac, N-A. and Kechadi, M-T.  (2014) “Smartphone Forensics Analysis: A Case Study for Obtaining Root Access of an Android SamSung S3 Device and Analyse the Image without an Expensive Commercial Tool”, Journal of Information Security, 5(3):83-90 DOI: http://dx.doi.org/10.4236/jis.2014.53009
  2. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A., (2014) "An Overview of Cloud Base Application Forensics Tools for Mobile Devices", International Journal of Applied Information Systems,  7(10):7-10 DOI: http://dx.doi.org/10.5120/ijais14-451232
  3. Scanlon, M., Farina, J., Le Khac, N-A. and Kechadi, M-T. (2014) 'Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync'. Journal of Association of Digital Forensics, Security and Law, 9 (2):85-100 DOI: http://dx.doi.org/10.15394/jdfsl.2014.1173

 

Peer-reviewed conferences

2019

  1. Diederichen L., Choo K-K. R. , Le-Khac NA. (2019), A Graph Database-based Approach to Analyze Network Log Files, The 13th International Conference on Network and System Security (NSS 2019), Sapporo, Japan, December 15 –18, 2019, Springer Lecture Notes in Computer Science  (B rank conference)
  2. Aditya K., Grzonkowski S., Asghar M-R. and Le-Khac NA., (2019), Black Box Attacks on Deep Anomaly Detectors, The 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 26 –29, 2019, DOI: 10.1145/3339252.3339266  (B rank conference)
  3. Anda F., Lillis D., Kanta A., Becker A. B., Bou-Harb E., Le-Khac NA., Scanlon M. (2019)  Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning, The 8th International Workshop on Cyber Crime (IWCC), held at the 14th International Conference on Availability, Reliability and Security (ARES), Canterbury, UK, August 26 –29, 2019, DOI: 10.1145/3339252.3341491  (B rank conference)
  4. Thantilage R. Le-Khac NA. (2019), Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019  (A rank conference)
  5. Aditya K, Grzonkowski S., Asghar M-R. and Le-Khac NA. (2019), Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection, 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-19), Rotorua, New Zealand, August, 2019  (A rank conference)
  6. Elsayed S. M., Le-Khac NA., Dev S., Jurcut A.D. (2019) Machine Learning Techniques for Detecting Attacks in SDN, IEEE 7th IEEE International Conference on Computer Science and Network Technology, Dalian, China, October 19-20, 2019
  7. Ngo Q.H., Le-Khac NA., Kechadi T. (2019),  Predicting Soil pH by Using Nearest Fields, AI-2019 Thirty-ninth SGAI International Conference on Artificial Intelligence, Cambridge, UK 17-19 December 2019, Lecture Notes in Computer Science.   (C rank conference)
  8. M.Vuong Ngo, Le-Khac NA., Kechadi M-T. (2019), Designing and Implementing Data Warehouse for Agricultural Big Data, The 2019 International Congress on Big Data June 25 - June 30, 2019, San Diego, USA, Lecture Notes in Computer Science (LNCS), Springer International Publishing AG, DOI:  https://doi.org/10.1007/978-3-030-23551-2_1
  9. Steiner D., Chen L., Hayes D., Le-Khac NA. (2019) Vehicle Communication within Networks – Investigation and Analysis approach: A Case Study, 14th annual ADFSL Conference on Digital Forensics, Security and Law, FL. USA, May 2019 Link
  10. Vieyra J., Scanlon M., Le-Khac NA. (2019) Solid State Drive Forensics: Where Do We Stand?. In: Breitinger F., Baggili I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol 259. Springer, Cham, DOI:  https://doi.org/10.1007/978-3-030-05487-8_8

2018

  1. Aditya K., Grzonkowski S., Le-Khac NA. (2018) RiskWriter: Predicting Cyber Risk of an Enterprise. In: Ganapathy V., Jaeger T., Shyamasundar R. (eds) Information Systems Security. ICISS 2018. Lecture Notes in Computer Science, vol 11281. Springer, Cham, DOI: https://doi.org/10.1007/978-3-030-05171-6_5   (B rank conference)
  2. Ngo Q.H., Le-Khac NA., Kechadi T. (2018) Ontology Based Approach for Precision Agriculture. In: Kaenampornpan M., Malaka R., Nguyen D., Schwind N. (eds) Multi-disciplinary Trends in Artificial Intelligence. MIWAI 2018. Lecture Notes in Computer Science, vol 11248. Springer, Cham, DOI: https://doi.org/10.1007/978-3-030-03014-8_15
  3. Arnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac​ (2018) A Forensic Investigation Framework for Smart Home Environment, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00201  (A rank conference)
  4. Aditya Kuppa, Slawomir Grzonkowski, Le-Khac NA.​ (2018) ​, Enabling Trust in Deep Learning Models: A Digital Forensics Case Study, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), New York, USA, August, 2018, DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2018.00172  (A rank conference)
  5.  Asanka Sayakkara, Le-Khac NA.​, Mark Scanlon, Enhanced Electromagnetic Side-channel Eavesdropping Attacks on Computer Monitors, The Second International Workshop on Criminal Use of Information Hiding (CUING), part of the 13th International Conference on Availability, Reliability and Security (ARES), Hamburg, Germany, August, 2018. DOI: https://doi.org/10.1145/3230833.3234690
  6. M.Vuong Ngo, Le-Khac NA.​, M-Tahar Kechadi, An Efficient Data Warehouse for Crop Yield Prediction, 14th International Conference on Precision Agriculture, Montreal, Canada, June, 2018
  7. Yves Vandermeer, M-T. Kechadi, J. Carthy, Le-Khac NA.​ (2018), Forensic Analysis of the exFAT Artefacts, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018
  8.  Alan Roder, Kim-Kwang Raymond Choo, Le-Khac NA.​ (2018), Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, 13th annual ADFSL Conference on Digital Forensics, Security and Law, Texas, USA, May 2018
  9. Asanka Sayakkara, Le-Khac NA.​, Mark Scanlon, Electromagnetic Side-Channel A acks: Potential for Progressing Hindered Digital Forensic Analysis, Proceedings of the International Workshop on Speculative Side Channel Analysis (WoSSCA 2018), Amsterdam, The Netherlands, July, 2018
  10. Felix Anda, David Lillis, Le-Khac NA.​, Mark Scanlon (2018), Evaluating Automated Facial Age Estimation Techniques for Digital Forensics, 12th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2018, DOI: https://doi.org/10.1109/SPW.2018.00028

2017

  1. Nguyen TA., Le-Khac NA., Kechadi MT. (2017) Privacy-Aware Data Analysis Middleware for Data-Driven EHR Systems. In: Dang T., Wagner R., Küng J., Thoai N., Takizawa M., Neuhold E. (eds) Future Data and Security Engineering. FDSE 2017. Lecture Notes in Computer Science, vol 10646. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-70004-5_24
  2.  Daniel Jacobs, Kim-Kwang Raymond Choo, M-Tahar Kechadi, Nhien-An Le-Khac.​ (2017) “Volkswagen Car Entertainment System Forensics”, 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 699-705, Sydney, Australia, August 2017, DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.302  (A rank conference)
  3.  Wybren Van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M-Tahar Kechadi (2017) “Investigation and Automating Extraction of Thumbnails Produced by Image viewers”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.355  (A rank conference)
  4. Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac (2017) “Privileged Data within Digital Evidence”,16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom-17), pp. 1076-1081, Sydney, Australia, August 2017 DOI: https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.307  (A rank conference)
  5. Malika Bendechache, Nhien-An Le-Khac and M-Tahar Kechadi (2017) “Distributed Spatial Data Clustering as a New Approach for Big Data Analysis”, 15th Australasian Data Mining Conference, Melbourne, 19-20 August 2017   (B rank conference)
  6. Alan Reed, Mark Scanlon, Nhien-An Le-Khac (2017) “Forensic Analysis of Epic Privacy Browser on Windows Operating Systems”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017   (C rank conference)
  7. Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon (2017) “Integration of Ether Unpacker into Ragpicker for Plugin-Based Malware Analysis and Identification”,16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017 (C rank conference)
  8. Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon (2017) “Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017 (C rank conference)
  9. Felix Anda, Mark Scanlon, Nhien-An Le-Khac (2017) “Automated Machine Learning-Based Digital Evidence Classification Techniques”, 16th European Conference on Cyber Warfare and Security, Dublin, Ireland, June 2017 (C rank conference)
  10. Bontemps, L.; Cao, V-L.; McDermott, James; Le-Khac N-A (2016) “Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks”, Lecture Notes in Computer Science, Vol. 10018: 141-152 Nov 2016 DOI: https://doi.org/10.1007/978-3-319-48057-2_9

2016

  1. Vliet, PV.; Kechadi, M-T.; Le-Khac N-A., (2016) “Forensics in Industrial Control system: A Case Study”, Lecture Notes in Computer Science, Vol. 9588: 147-156 June 2016  DOI: https://doi.org/10.1007/978-3-319-40385-4_10
  2. Tillekens, A., Le-Khac N-A., and Pham-Thi, T-T.; (2016) “A Bespoke Forensics GIS Tool”, IEEE International Symposium On Mobile Computing, Wireless Networks, and Security, Nevada, USA, Dec 2016. DOI: https://doi.org/10.1109/CSCI.2016.0189
  3. Bendechache, M., Le-Khac N-A., and Kechadi, M-T.; (2016) Hierarchical Aggregation Approach for Distributed clustering of spatial datasets, 16th IEEE International Conference on Data Mining (ICDM), Workshops, Barcelona, Spain, Dec 2016 DOI: https://doi.org/10.1109/ICDMW.2016.0158
  4. Cao V-L., Le-Khac N-A., O'Neill M, Nicolau M, McDermott J, (2016) “Improving Fitness Functions in Genetic Programming for Classification on Unbalanced Credit Card Data”, Applications of Evolutionary Computation, Lecture Notes in Computer Science, Vol. 9597: p.35-45 March 2016  DOI: https://doi.org/10.1007/978-3-319-31204-0_3
  5. R. Gomm R., Le-Khac N-A., , M. Scanlon, M-Tahar Kechadi (2016) “Analytical Approach to the Recovery of Data from CCTV File Systems”, The 15th European Conference on Cyber Warfare and Security (ECCWS 2016), Munich, Germany, July 2016 p.117-126
  6. Faheem, M.; Kechadi, M-T.; Le-Khac, N-A., (2016) “Toward a new mobile cloud forensic framework” The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016  DOI: https://doi.org/10.1109/INTECH.2016.7845142
  7. Ryder, Steven and Le-Khac N-A., (2016) “The End of effective Law Enforcement in the Cloud? -- To encrypt, or not to encrypt”, The 9th IEEE International Conference on Cloud Computing, San Francisco, CA USA, June 2016  DOI: https://doi.org/10.1109/CLOUD.2016.0133 (B rank conference)
  8. Tobin, P.; Le-Khac N-A., and Kechadi, M-T (2016) “A Lightweight Software Write-blocker for Virtual Machine Forensics”, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016 DOI: https://doi.org/10.1109/INTECH.2016.7845141
  9. Nicolls, Vincent; Le-Khac N-A.,; Chen,Lei; Scanlon, Mark (2016) IPv6 Security and Forensics, The 6th IEEE International Conference on Innovative Computing Technology, Dublin, Ireland, August 2016  DOI: https://doi.org/10.1109/INTECH.2016.7845143
  10. Cushman, Isaac and Chen, Lei and Rawat, Danda and Le-Khac N-A. (2016), “Designing Hybrid Cloud using OpenStack for Supporting Multimedia with Security and Privacy Concerns”, 9th EAI International Conference on Mobile Multimedia Communications, Xi'an, China, June 18–19, 2016
  11. Tobin, P.; Le-Khac N-A., and Kechadi, M-T (2016). ”Forensic Analysis of Virtual Hard Drives” Eleventh International Conference on the Systematic Approaches to Digital Forensics Engineering, Kyoto, Japan, September 2016 
  12. F. Kolenbrander, Le-Khac N-A., M-T. Kechadi, (2016) “Forensic Analysis of ARES GALAXY Peer-To-Peer Network”, 11th annual ADFSL Conference on Digital Forensics, Security and Law, Florida, USA, May 2016
  13. A. Linke, Le-Khac N-A., (2016) “Control Flow Change in Assembly as a Classifier in Malware Analysis”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016  DOI: https://doi.org/10.1109/ISDFS.2016.7473514
  14. Bendechache, M.,., Kechadi, M-T. and Le-Khac N-A; (2016) “Efficient Large Scale Clustering based on Data Partitioning The 3rd IEEE International Conference on Data Science and Advanced Analytics, Montreal, October 2016  DOI: https://doi.org/10.1109/DSAA.2016.70
  15. R. Witteman, A. Meijer, Le-Khac N-A., M-T. Kechadi (2016), “Toward a new tool to extract the Evidence from a Memory Card of Mobile phones”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 DOI: https://doi.org/10.1109/ISDFS.2016.7473533
  16. R. Braekt, Le-Khac N-A., J. Farina, M. Scanlon, M-T. Kechadi,  (2016) “Increasing Digital Investigator Availability Through Efficient Workflow Management And Automation”, 4th IEEE International Symposium on Digital Forensics and Security, Arkansas, USA, April 2016 DOI: https://doi.org/10.1109/ISDFS.2016.7473520

2015

  1. Christos Sgaras, M. Tahar Kechadi and Le-Khac N-A, (2015) “Forensics Acquisition and Analysis of instant messaging and VoIP applications”, Lecture Notes in Computer Science, Vol.8915: 188-199 June 2015  DOI: https://doi.org/10.1007/978-3-319-20125-2_16
  2.  J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  "Overview of the Forensic Investigation of Cloud Services", WCSF 2015 workshop, 10th International Conference on Availability, Reliability and Security,  Toulouse, France, August 24-28, 2015  DOI: https://doi.org/10.1109/ARES.2015.81
  3. J. Farina, M. Scanlon, Le-Khac N-A and M-T. Kechadi, (2015)  "HTML5 Zero Configuration Covert Channels: Security Risks and Challenges", The 10th ADFSL Conference on Digital Forensics, Security and Law (ADFSL 2015), Florida, USA, May 19 -21, 2015 
  4. Hung V. Cao, K. X. Chu, Le-Khac N-A, M-T. Kechadi, D. Laefer and Linh Hong Truong, (2015)  "Toward a new approach for massive LiDAR data processing", IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, July  6 - 7, 2015, Fuzhou, China  DOI: https://doi.org/10.1109/ICSDM.2015.7298040
  5. H. Schut, J. Farina, M. Scanlon and Le-Khac N-A, (2015)  "Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps", The 10th International Workshop on Frontiers in Availability, Reliability and Security FARES 2015, Toulouse, France, August 24-28, 2015, DOI: https://doi.org/10.1109/ARES.2015.77
  6. J. Plunkett, M. Tahar Kechadi and Le-Khac N-A, (2015)   “Digital Forensic Investigations in the Cloud A Proposed Approach for Irish Law Enforcement”, The 11th Annual IFIP WG 11.9 International Conference on Digital Forensics Orlando, Florida, USA, January 26 - 28, 2015

2014

  1. Maarten van Barneveld, Le-Khac N-A and M. Tahar Kechadi (2014), “Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation”, Lecture Notes in Computer Science, Vol. 8860: 29-43 November 2014  DOI: https://doi.org/10.1007/978-3-319-12778-1_3
  2. Mark Scanlon, Jason Farina, Le-Khac N-A and M. Tahar Kechadi, (2014) “Leveraging Decentralisation to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync”, 6th International Conference on Digital Forensics & Cyber Crime (ICDF2C 2014),  Connecticut, USA, September 18th-20th, 2014  DOI: https://doi.org/10.15394/jdfsl.2014.1173
  3. B. Busstra, M. Tahar Kechadi and , Le-Khac N-A, (2014) “Android and Wireless data-extraction using Wi-Fi”, 4th IEEE international conference on Innovative Computing Technology (INTECH 2014), Luton, UK, August 13th-15th, 2014  DOI: https://doi.org/10.1109/INTECH.2014.6927769