Name
Papers
Collaborators
NHIEN-AN LE-KHAC
122
155
Citations 
PageRank 
Referers 
224
49.63
380
Referees 
References 
1428
779
Search Limit
1001000
Title
Citations
PageRank
Year
Scalability and Performance of LiDAR Point Cloud Data Management Systems: A State-of-the-Art Review.00.342022
Linking CVE's to MITRE ATT&CK Techniques00.342021
Structural Textile Pattern Recognition And Processing Based On Hypergraphs00.342021
Code-Free Cloud Computing Service To Facilitate Rapid Biomedical Digital Signal Processing And Algorithm Development00.342021
Towards Improving Privacy of Synthetic DataSets.00.342021
Forensic analysis of Matrix protocol and Riot.im application00.342021
Vec2UAge: Enhancing underage age estimation performance through facial embeddings00.342021
Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]00.342021
A comparative study of support vector machine and neural networks for file type identification using n-gram analysis10.432021
A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs00.342021
Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection10.372020
Lightweight Privacy-Preserving Data Classification00.342020
Towards A New Approach to Identify WhatsApp Messages.00.342020
Forensic analysis of privacy-oriented cryptocurrencies10.342020
Smart vehicle forensics: Challenges and case study50.462020
Detecting Abnormal Traffic in Large-Scale Networks00.342020
Network Anomaly Detection Using LSTM Based Autoencoder00.342020
Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.00.342020
Retrieving E-Dating Application Artifacts from iPhone Backups.00.342020
EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis10.372020
Effect of Security Controls on Patching Window - A Causal Inference based Approach.00.342020
Towards a new deep learning based approach for the password prediction.00.342020
Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS.00.342019
Distributed Deep Deterministic Policy Gradient For Power Allocation Control In D2d-Based V2v Communications20.372019
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices.30.502019
Improving the accuracy of automated facial age estimation to aid CSEM investigations.00.342019
Predicting Soil Ph By Using Nearest Fields00.342019
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection00.342019
Non-Cooperative Energy Efficient Power Allocation Game in D2D Communication: A Multi-Agent Deep Reinforcement Learning Approach.20.382019
Designing and Implementing Data Warehouse for Agricultural Big Data.00.342019
A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics.80.582019
Black Box Attacks on Deep Anomaly Detectors20.382019
Forensic framework to identify local vs synced artefacts.00.342018
RiskWriter - Predicting Cyber Risk of an Enterprise.10.362018
Evaluating Automated Facial Age Estimation Techniques for Digital Forensics10.362018
Solid State Drive Forensics: Where Do We Stand?10.372018
Digital forensic investigation of two-way radio communication equipment and services.10.372018
Electromagnetic side-channel attacks - potential for progressing hindered digital forensic analysis.10.412018
Hierarchical Aggregation Approach for Distributed Clustering of Spatial Datasets.10.352018
Ontology Based Approach for Precision Agriculture.00.342018
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.10.362018
One-class Collective Anomaly Detection based on Long Short-Term Memory Recurrent Neural Networks.00.342018
An Efficient Data Warehouse for Crop Yield Prediction.00.342018
Forensic Analysis of the exFAT artefacts.10.372018
Performance Evaluation of a Distributed Clustering Approach for Spatial Datasets.00.342017
Grid-Based Approaches For Distributed Data Mining Applications120.622017
A Bespoke Forensics Gis Tool30.432017
Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service.20.392017
Volkswagen Car Entertainment System Forensics10.352017
Forensic Analysis of Epic Privacy Browser on Windows Operating Systems.00.342017
  • 1
  • 2