Skip to main content

Showing 1–50 of 57 results for author: Kechadi, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04244  [pdf, other

    cs.CL

    Benchmark Data Contamination of Large Language Models: A Survey

    Authors: Cheng Xu, Shuhao Guan, Derek Greene, M-Tahar Kechadi

    Abstract: The rapid development of Large Language Models (LLMs) like GPT-4, Claude-3, and Gemini has transformed the field of natural language processing. However, it has also resulted in a significant issue known as Benchmark Data Contamination (BDC). This occurs when language models inadvertently incorporate evaluation benchmark information from their training data, leading to inaccurate or unreliable per… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 31 pages, 7 figures, 3 tables

  2. arXiv:2403.17648  [pdf, ps, other

    cs.CR

    Healthcare Data Governance, Privacy, and Security -- A Conceptual Framework

    Authors: Amen Faridoon, M. Tahar Kechadi

    Abstract: The abundance of data has transformed the world in every aspect. It has become the core element in decision making, problem solving, and innovation in almost all areas of life, including business, science, healthcare, education, and many others. Despite all these advances, privacy and security remain critical concerns of the healthcare industry. It is important to note that healthcare data can als… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  3. arXiv:2307.06779  [pdf, other

    cs.CR

    Data Behind the Walls An Advanced Architecture for Data Privacy Management

    Authors: Amen Faridoon, M. Tahar Kechadi

    Abstract: In today's highly connected society, we are constantly asked to provide personal information to retailers, voter surveys, medical professionals, and other data collection efforts. The collected data is stored in large data warehouses. Organisations and statistical agencies share and use this data to facilitate research in public health, economics, sociology, etc. However, this data contains sensit… ▽ More

    Submitted 13 July, 2023; originally announced July 2023.

    Comments: 7 pages

  4. Winter Wheat Crop Yield Prediction on Multiple Heterogeneous Datasets using Machine Learning

    Authors: Yogesh Bansal, Dr. David Lillis, Prof. Mohand Tahar Kechadi

    Abstract: Winter wheat is one of the most important crops in the United Kingdom, and crop yield prediction is essential for the nation's food security. Several studies have employed machine learning (ML) techniques to predict crop yield on a county or farm-based level. The main objective of this study is to predict winter wheat crop yield using ML models on multiple heterogeneous datasets, i.e., soil and we… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Journal ref: International Conference on Computational Science and Computational Intelligence (CSCI 2022)

  5. arXiv:2306.11942   

    cs.LG

    A Deep Learning Model for Heterogeneous Dataset Analysis -- Application to Winter Wheat Crop Yield Prediction

    Authors: Yogesh Bansal, David Lillis, Mohand Tahar Kechadi

    Abstract: Western countries rely heavily on wheat, and yield prediction is crucial. Time-series deep learning models, such as Long Short Term Memory (LSTM), have already been explored and applied to yield prediction. Existing literature reported that they perform better than traditional Machine Learning (ML) models. However, the existing LSTM cannot handle heterogeneous datasets (a combination of data which… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    Comments: This version has been removed by arXiv administrators because the submitter did not have the authority to grant the license at the time of submission

  6. arXiv:2103.11271  [pdf

    cs.IR cs.CC cs.CV cs.LG

    Structural Textile Pattern Recognition and Processing Based on Hypergraphs

    Authors: Vuong M. Ngo, Sven Helmer, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: The humanities, like many other areas of society, are currently undergoing major changes in the wake of digital transformation. However, in order to make collection of digitised material in this area easily accessible, we often still lack adequate search functionality. For instance, digital archives for textiles offer keyword search, which is fairly well understood, and arrange their content follo… ▽ More

    Submitted 20 March, 2021; originally announced March 2021.

    Comments: 38 pages, 23 figures

    Journal ref: Information Retrieval Journal, Springer, 2021

  7. arXiv:2007.05119  [pdf

    cs.GT cs.LG

    Multi-objective Clustering Algorithm with Parallel Games

    Authors: Dalila Kessira, Mohand-Tahar Kechadi

    Abstract: Data mining and knowledge discovery are two important growing research fields in the last two decades due to the abundance of data collected from various sources. The exponentially growing volumes of generated data urge the development of several mining techniques to feed the needs for automatically derived knowledge. Clustering analysis (finding similar groups of data) is a well-established and w… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

  8. arXiv:2003.05043  [pdf

    cs.DB cs.CY cs.LG

    Crop Knowledge Discovery Based on Agricultural Big Data Integration

    Authors: Vuong M. Ngo, M-Tahar Kechadi

    Abstract: Nowadays, the agricultural data can be generated through various sources, such as: Internet of Thing (IoT), sensors, satellites, weather stations, robots, farm equipment, agricultural laboratories, farmers, government agencies and agribusinesses. The analysis of this big data enables farmers, companies and agronomists to extract high business and scientific knowledge, improving their operational p… ▽ More

    Submitted 10 March, 2020; originally announced March 2020.

    Comments: 5 pages

    Journal ref: ICMLSC-2020

  9. arXiv:2003.04470  [pdf, ps, other

    cs.DB cs.DC cs.LG cs.PF

    Data Warehouse and Decision Support on Integrated Crop Big Data

    Authors: V. M. Ngo, N. A. Le-Khac, M. T. Kechadi

    Abstract: In recent years, precision agriculture is becoming very popular. The introduction of modern information and communication technologies for collecting and processing Agricultural data revolutionise the agriculture practises. This has started a while ago (early 20th century) and it is driven by the low cost of collecting data about everything; from information on fields such as seed, soil, fertilise… ▽ More

    Submitted 12 April, 2021; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: 13 pages, 11 figures. arXiv admin note: text overlap with arXiv:1905.12411

    Journal ref: International Journal of Business Process Integration and Management 2020 Vol.10 No.1

  10. Knowledge Map: Toward a New Approach Supporting the Knowledge Management in Distributed Data Mining

    Authors: Nhien-An Le-Khac, Lamine M. Aouad, M-Tahar Kechadi

    Abstract: Distributed data mining (DDM) deals with the problem of finding patterns or models, called knowledge, in an environment with distributed data and computations. Today, a massive amounts of data which are often geographically distributed and owned by different organisation are being mined. As consequence, a large mount of knowledge are being produced. This causes problems of not only knowledge manag… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

    Comments: Third International Conference on Autonomic and Autonomous Systems (ICAS'07)

  11. Recurrent neural network approach for cyclic job shop scheduling problem

    Authors: M-Tahar Kechadi, Kok Seng Low, G. Goncalves

    Abstract: While cyclic scheduling is involved in numerous real-world applications, solving the derived problem is still of exponential complexity. This paper focuses specifically on modelling the manufacturing application as a cyclic job shop problem and we have developed an efficient neural network approach to minimise the cycle time of a schedule. Our approach introduces an interesting model for a manufac… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: Journal of Manufacturing Systems, Volume 32, Issue 4, October 2013, Pages 689-699

  12. arXiv:1908.10229  [pdf, other

    cs.CR cs.CY

    A Security-Aware Access Model for Data-Driven EHR System

    Authors: Ngoc Hong Tran, Thien-An Nguyen-Ngoc, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Digital healthcare systems are very popular lately, as they provide a variety of helpful means to monitor people's health state as well as to protect people against an unexpected health situation. These systems contain a huge amount of personal information in a form of electronic health records that are not allowed to be disclosed to unauthorized users. Hence, health data and information need to b… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: 13 pages, 12 figures, 3 tables

  13. arXiv:1905.12411  [pdf, other

    cs.DB cs.AI cs.LG cs.PF

    Designing and Implementing Data Warehouse for Agricultural Big Data

    Authors: Vuong M. Ngo, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: In recent years, precision agriculture that uses modern information and communication technologies is becoming very popular. Raw and semi-processed agricultural data are usually collected through various sources, such as: Internet of Thing (IoT), sensors, satellites, weather stations, robots, farm equipment, farmers and agribusinesses, etc. Besides, agricultural datasets are very large, complex, u… ▽ More

    Submitted 29 May, 2019; originally announced May 2019.

    Comments: Business intelligent, data warehouse, constellation schema, Big Data, precision agriculture

    Journal ref: BigData 2019

  14. arXiv:1903.03061  [pdf

    cs.DL cs.AI cs.CR

    DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge

    Authors: Damir Kahvedzic, Tahar Kechadi

    Abstract: This paper presents DIALOG (Digital Investigation Ontology); a framework for the management, reuse, and analysis of Digital Investigation knowledge. DIALOG provides a general, application independent vocabulary that can be used to describe an investigation at different levels of detail. DIALOG is defined to encapsulate all concepts of the digital forensics field and the relationships between them.… ▽ More

    Submitted 21 February, 2019; originally announced March 2019.

    Journal ref: Digital Investigation Volume 6, Supplement, September 2009, Pages S23-S33

  15. arXiv:1903.03008  [pdf

    cs.LG cs.DC stat.ML

    Performance study of distributed Apriori-like frequent itemsets mining

    Authors: Lamine M. Aouad, Nhien-An Le-Khac, Tahar M. Kechadi

    Abstract: In this article, we focus on distributed Apriori-based frequent itemsets mining. We present a new distributed approach which takes into account inherent characteristics of this algorithm. We study the distribution aspect of this algorithm and give a comparison of the proposed approach with a classical Apriori-like distributed algorithm, using both analytical and experimental studies. We find that… ▽ More

    Submitted 21 February, 2019; originally announced March 2019.

    Journal ref: Knowledge and Information Systems April 2010, Volume 23, Issue 1

  16. arXiv:1903.01396  [pdf

    cs.CY cs.CR cs.LG

    A complete formalized knowledge representation model for advanced digital forensics timeline analysis

    Authors: Yoan Chabot, Aurélie Bertaux, Christophe Nicollea, Tahar Kechadi

    Abstract: Having a clear view of events that occurred over time is a difficult objective to achieve in digital investigations (DI). Event reconstruction, which allows investigators to understand the timeline of a crime, is one of the most important step of a DI process. This complex task requires exploration of a large amount of events due to the pervasiveness of new technologies nowadays. Any evidence prod… ▽ More

    Submitted 21 February, 2019; originally announced March 2019.

    Journal ref: Digital Investigation Volume 11, Supplement 2, August 2014, Pages S95-S105

  17. Dynamic task scheduling in computing cluster environments

    Authors: I. K. Savvas, M. Tahar Kechadi

    Abstract: In this study, a cluster-computing environment is employed as a computational platform. In order to increase the efficiency of the system, a dynamic task scheduling algorithm is proposed, which balances the load among the nodes of the cluster. The technique is dynamic, nonpreemptive, adaptive, and it uses a mixed centralised and decentralised policies. Based on the divide and conquer principle, th… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks

  18. arXiv:1807.00035  [pdf

    cs.CY cs.DB

    An Efficient Data Warehouse for Crop Yield Prediction

    Authors: Vuong M. Ngo, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Nowadays, precision agriculture combined with modern information and communications technologies, is becoming more common in agricultural activities such as automated irrigation systems, precision planting, variable rate applications of nutrients and pesticides, and agricultural decision support systems. In the latter, crop management data analysis, based on machine learning and data mining, focus… ▽ More

    Submitted 26 June, 2018; originally announced July 2018.

    Comments: 12 pages. Keywords. Data warehouse, constellation schema, crop yield prediction, precision agriculture

    Journal ref: Proceedings of the 14th International Conference on Precision Agriculture. June 24 to June 27, 2018, Montreal, Quebec, Canada

  19. arXiv:1804.08653  [pdf

    cs.CR

    Forensic Analysis of the exFAT artefacts

    Authors: Yves Vandermeer, Nhien-An Le-Khac, Joe Carthy, Tahar Kechadi

    Abstract: Although kee** some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new map** scheme of directory entries. The combination of exFAT map** scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

  20. arXiv:1802.00688  [pdf, other

    cs.DB cs.DC cs.LG

    Hierarchical Aggregation Approach for Distributed clustering of spatial datasets

    Authors: Malika Bendechache, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: In this paper, we present a new approach of distributed clustering for spatial datasets, based on an innovative and efficient aggregation technique. This distributed approach consists of two phases: 1) local clustering phase, where each node performs a clustering on its local data, 2) aggregation phase, where the local clusters are aggregated to produce global clusters. This approach is characteri… ▽ More

    Submitted 1 February, 2018; originally announced February 2018.

    Comments: 6 pages. arXiv admin note: substantial text overlap with arXiv:1704.03421

  21. Distributed Clustering Algorithm for Spatial Data Mining

    Authors: Malika Bendechache, M-Tahar Kechadi

    Abstract: Distributed data mining techniques and mainly distributed clustering are widely used in the last decade because they deal with very large and heterogeneous datasets which cannot be gathered centrally. Current distributed clustering approaches are normally generating global models by aggregating local results that are obtained on each site. While this approach mines the datasets on their locations… ▽ More

    Submitted 1 February, 2018; originally announced February 2018.

    Comments: 6 pages. arXiv admin note: text overlap with arXiv:1704.03421

    Journal ref: Spatial Data Mining and Geographical Knowledge Services (ICSDM), 2015 2nd IEEE International Conference on, pages 60--65, 2015

  22. arXiv:1801.10391  [pdf

    cs.CR

    Internet of things forensics: Challenges and Case Study

    Authors: Saad Alabdulsalam, Kevin Schaefer, Tahar Kechadi, Nhien-An Le-Khac

    Abstract: Today is the era of Internet of Things (IoT), millions of machines such as cars, smoke detectors, watches, glasses, webcams, etc. are being connected to the Internet. The number of machines that possess the ability of remote access to monitor and collect data is continuously increasing. This development makes, on one hand, the human life more comfort- able, convenient, but it also raises on other… ▽ More

    Submitted 31 January, 2018; originally announced January 2018.

  23. arXiv:1710.09593  [pdf, other

    cs.DC

    Distributed Spatial Data Clustering as a New Approach for Big Data Analysis

    Authors: Malika Bendechache, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: In this paper we propose a new approach for Big Data mining and analysis. This new approach works well on distributed datasets and deals with data clustering task of the analysis. The approach consists of two main phases, the first phase executes a clustering algorithm on local data, assuming that the datasets was already distributed among the system processing nodes. The second phase deals with t… ▽ More

    Submitted 1 March, 2018; v1 submitted 26 October, 2017; originally announced October 2017.

  24. arXiv:1708.09053  [pdf

    cs.CR

    Increasing digital investigator availability through efficient workflow management and automation

    Authors: Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M-Tahar Kechadi

    Abstract: The growth of digital storage capacities and diversity devices has had a significant time impact on digital forensic laboratories in law enforcement. Backlogs have become commonplace and increasingly more time is spent in the acquisition and preparation steps of an investigation as opposed to detailed evidence analysis and reporting. There is generally little room for increasing digital investigat… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  25. arXiv:1708.09051  [pdf

    cs.CR

    Investigation and Automating Extraction of Thumbnails Produced by Image viewers

    Authors: Wybren van der Meer, Kim-Kwang Raymond Choo, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Today, in digital forensics, images normally provide important information within an investigation. However, not all images may still be available within a forensic digital investigation as they were all deleted for example. Data carving can be used in this case to retrieve deleted images but the carving time is normally significant and these images can be moreover overwritten by other data. One o… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  26. arXiv:1704.04302  [pdf

    cs.DB

    On a Distributed Approach for Density-based Clustering

    Authors: Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Efficient extraction of useful knowledge from these data is still a challenge, mainly when the data is distributed, heterogeneous and of different quality depending on its corresponding local infrastructure. To reduce the overhead cost, most of the existing distributed clustering approaches generate global models by aggregating local results obtained on each individual node. The complexity and qua… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

  27. arXiv:1704.04301  [pdf

    cs.DB

    A Tree-based Approach for Detecting Redundant Business Rules in very Large Financial Datasets

    Authors: Nhien-An Le-Khac, Sammer Markos, M-Tahar Kechadi

    Abstract: Net Asset Value (NAV) calculation and validation is the principle task of a fund administrator. If the NAV of a fund is calculated incorrectly then there is huge impact on the fund administrator; such as monetary compensation, reputational loss, or loss of business. In general, these companies use the same methodology to calculate the NAV of a fund, however the type of fund in question dictates th… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

  28. arXiv:1704.03538  [pdf

    cs.DC

    Toward a Distributed Knowledge Discovery system for Grid systems

    Authors: Nhien-An Le-Khac, Lamine Aouad, M-Tahar Kechadi

    Abstract: During the last decade or so, we have had a deluge of data from not only science fields but also industry and commerce fields. Although the amount of data available to us is constantly increasing, our ability to process it becomes more and more difficult. Efficient discovery of useful knowledge from these datasets is therefore becoming a challenge and a massive economic need. This led to the need… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

  29. arXiv:1704.03530  [pdf

    cs.DC cs.CV

    Feature Selection Parallel Technique for Remotely Sensed Imagery Classification

    Authors: Nhien-An Le-Khac, M-Tahar Kechadi, Bo Wu, C. Chen

    Abstract: Remote sensing research focusing on feature selection has long attracted the attention of the remote sensing community because feature selection is a prerequisite for image processing and various applications. Different feature selection methods have been proposed to improve the classification accuracy. They vary from basic search techniques to clonal selections, and various optimal criteria have… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

  30. arXiv:1704.03527  [pdf

    cs.DC cs.CV

    Toward a new approach for massive LiDAR data processing

    Authors: V-H Cao, K-X Chu, Nhien-An Le-Khac, M-T Kechadi, Debra F. Laefer, Linh Truong-Hong

    Abstract: Laser scanning (also known as Light Detection And Ranging) has been widely applied in various application. As part of that, aerial laser scanning (ALS) has been used to collect topographic data points for a large area, which triggers to million points to be acquired. Furthermore, today, with integrating full wareform (FWF) technology during ALS data acquisition, all return information of laser pul… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

  31. arXiv:1704.03524  [pdf

    cs.CR

    Forensic Analysis of TomTom Navigation Application

    Authors: Nhien-An Le-Khac, Mark Roeloffs, M-Tahar Kechadi

    Abstract: In the forensic field of digital technology, there has been a great deal of investigation into the decoding of navigation systems of the brand TomTom. As TomTom is the market leader in navigation systems, a large number of these devices are investigated. These devices can hold an abundance of significant location information. Currently, it is possible with the use of multiple methods to make physi… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

  32. Efficient Large Scale Clustering based on Data Partitioning

    Authors: Malika Bendechache, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Clustering techniques are very attractive for extracting and identifying patterns in datasets. However, their application to very large spatial datasets presents numerous challenges such as high-dimensionality data, heterogeneity, and high complexity of some algorithms. For instance, some algorithms may have linear complexity but they require the domain knowledge in order to determine their input… ▽ More

    Submitted 26 February, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 10 pages

    Journal ref: Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on, 612--621, 2016

  33. arXiv:1703.09823  [pdf

    cs.DB

    Variance-based Clustering Technique for Distributed Data Mining Applications

    Authors: Lamine M. Aouad, Nhien-An Le-Khac, Tahar Kechadi

    Abstract: Nowadays, huge amounts of data are naturally collected in distributed sites due to different facts and moving these data through the network for extracting useful knowledge is almost unfeasible for either technical reasons or policies. Furthermore, classical par- allel algorithms cannot be applied, specially in loosely coupled environments. This requires to develop scalable distributed algorithms… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

  34. arXiv:1703.09807  [pdf

    cs.DB

    Grid-based Approaches for Distributed Data Mining Applications

    Authors: Lamine M. Aouad, Nhien-An Le-Khac, Tahar Kechadi

    Abstract: The data mining field is an important source of large-scale applications and datasets which are getting more and more common. In this paper, we present grid-based approaches for two basic data mining applications, and a performance evaluation on an experimental grid environment that provides interesting monitoring capabilities and configuration tools. We propose a new distributed clustering approa… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

  35. arXiv:1703.09756  [pdf

    cs.DC

    Admire framework: Distributed data mining on data grid platforms

    Authors: Nhien-An Le-Khac, M-Tahar Kechadi, Joe Carthy

    Abstract: In this paper, we present the ADMIRE architecture; a new framework for develo** novel and innovative data mining techniques to deal with very large and distributed heterogeneous datasets in both commercial and academic applications. The main ADMIRE components are detailed as well as its interfaces allowing the user to efficiently develop and implement their data mining applications techniques on… ▽ More

    Submitted 28 March, 2017; originally announced March 2017.

  36. arXiv:1612.00204  [pdf

    cs.CR

    Forensics Acquisition and Analysis of instant messaging and VoIP applications

    Authors: Christos Sgaras, M-Tahar Kechadi, Nhien-An Le-Khac

    Abstract: The advent of the Internet has significantly transformed the daily activities of millions of people, with one of them being the way people communicate where Instant Messaging (IM) and Voice over IP (VoIP) communications have become prevalent. Although IM applications are ubiquitous communication tools nowadays, it was observed that the relevant research on the topic of evidence collection from IM… ▽ More

    Submitted 1 December, 2016; originally announced December 2016.

  37. arXiv:1611.09566  [pdf

    cs.CR

    The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends

    Authors: Muhammad Faheem, M-Tahar Kechadi, Nhien-An Le-Khac

    Abstract: Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud comput… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

  38. arXiv:1611.09564  [pdf

    cs.CR

    Toward a new mobile cloud forensic framework

    Authors: Muhammad Faheem, M-Tahar Kechadi, Nhien-An Le-Khac

    Abstract: Smartphones have created a significant impact on the day to day activities of every individual. Now a days a wide range of Smartphone applications are available and it necessitates high computing resources in order to build these applications. Cloud computing offers enormous resources and extends services to resource-constrained mobile devices. Mobile Cloud Computing is emerging as a key technolog… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

  39. arXiv:1611.01754  [pdf

    cs.CR

    Forensics in Industrial Control System: A Case Study

    Authors: Pieter Van Vliet, M-T. Kechadi, Nhien-An Le-Khac

    Abstract: Industrial Control Systems (ICS) are used worldwide in critical infrastructures. An ICS system can be a single embedded system working stand-alone for controlling a simple process or ICS can also be a very complex Distributed Control System (DCS) connected to Supervisory Control And Data Acquisition (SCADA) system(s) in a nuclear power plant. Although ICS are widely used to-day, there are very lit… ▽ More

    Submitted 6 November, 2016; originally announced November 2016.

  40. arXiv:1609.02976  [pdf

    cs.AI cs.LG

    An Integrated Classification Model for Financial Data Mining

    Authors: Fan Cai, Nhien-An Le-Khac, M-T. Kechadi

    Abstract: Nowadays, financial data analysis is becoming increasingly important in the business market. As companies collect more and more data from daily operations, they expect to extract useful knowledge from existing collected data to help make reasonable decisions for new customer requests, e.g. user credit category, churn analysis, real estate analysis, etc. Financial institutes have applied different… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

  41. arXiv:1609.02966  [pdf

    cs.CR

    Android and Wireless data-extraction using Wi-Fi

    Authors: Bert Busstra, Nhien-An Le-Khac, M-Tahar Kechadi

    Abstract: Today, mobile phones are very popular, fast growing technology. Mobile phones of the present day are more and more like small computers. The so-called "smartphones" contain a wealth of information each. This information has been proven to be very useful in crime investigations, because relevant evidence can be found in data retrieved from mobile phones used by criminals. In traditional methods, th… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

  42. arXiv:1609.02954  [pdf

    cs.CR

    Forensics Acquisition of IMVU: A Case Study

    Authors: Robert van Voorst, M-Tahar Kechadi, Nhien-An Le-Khac

    Abstract: There are many applications available for personal computers and mobile devices that facilitate users in meeting potential partners. There is, however, a risk associated with the level of anonymity on using instant message applications, because there exists the potential for predators to attract and lure vulnerable users. Today Instant Messaging within a Virtual Universe (IMVU) combines custom ava… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

  43. arXiv:1609.02953  [pdf

    cs.CR

    Toward a new tool to extract the Evidence from a Memory Card of Mobile phones

    Authors: Rob Witteman, Arjen Meijer, M-T. Kechadi, Nhien-An Le-Khac

    Abstract: Today, a mobile phone is not just a phone but it is a computer that you can also use for calling someone. Besides, in criminal investigations the importance of evidence from the mobile phone is increasing as more and more phones are seized at the Digital Forensic Department of the police. Indeed, the amount of memory cards of these mobile phones that need to be investigated separately is also incr… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

  44. arXiv:1609.02031  [pdf

    cs.DB cs.CE

    An efficient Search Tool for an Anti-Money Laundering Application of an Multi-national Bank's Dataset

    Authors: Nhien-An Le-Khac, Sammer Markos, Michael O'Neill, Anthony Brabazon, Tahar Kechadi

    Abstract: Today, money laundering (ML) poses a serious threat not only to financial institutions but also to the nations. This criminal activity is becoming more and more sophisticated and seems to have moved from the clichy of drug trafficking to financing terrorism and surely not forgetting personal gain. Most of the financial institutions internationally have been implementing anti-money laundering solut… ▽ More

    Submitted 28 March, 2017; v1 submitted 4 September, 2016; originally announced September 2016.

  45. arXiv:1609.00992  [pdf

    cs.IR cs.CY

    Performance Evaluation of a Natural Language Processing approach applied in White Collar crime investigation

    Authors: Maarten Banerveld, Nhien-An Le-Khac, Tahar Kechadi

    Abstract: In today world we are confronted with increasing amounts of information every day coming from a large variety of sources. People and co-operations are producing data on a large scale, and since the rise of the internet, e-mail and social media the amount of produced data has grown exponentially. From a law enforcement perspective we have to deal with these huge amounts of data when a criminal inve… ▽ More

    Submitted 4 September, 2016; originally announced September 2016.

  46. arXiv:1609.00990  [pdf

    cs.DB cs.CY

    A data mining-based solution for detecting suspicious money laundering cases in an investment bank

    Authors: Nhien-An Le-Khac, Sammer Markos, Tahar Kechadi

    Abstract: Today, money laundering poses a serious threat not only to financial institutions but also to the nation. This criminal activity is becoming more and more sophisticated and seems to have moved from the clichy of drug trafficking to financing terrorism and surely not forgetting personal gain. Most international financial institutions have been implementing anti-money laundering solutions to fight i… ▽ More

    Submitted 4 September, 2016; originally announced September 2016.

  47. arXiv:1609.00988  [pdf

    cs.DB

    A clustering-based data reduction for very large spatio-temporal datasets

    Authors: Nhien-An Le-Khac, Martin Bue, Michael Whelan, Tahar Kechadi

    Abstract: Today, huge amounts of data are being collected with spatial and temporal components from sources such as meteorological, satellite imagery etc. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology to discover hidden knowledge in very large amounts of data.… ▽ More

    Submitted 29 March, 2017; v1 submitted 4 September, 2016; originally announced September 2016.

  48. arXiv:1510.00661  [pdf, other

    cs.CR cs.CY cs.NI

    HTML5 Zero Configuration Covert Channels: Security Risks and Challenges

    Authors: Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le Khac, M-Tahar Kechadi

    Abstract: In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to- peer (P2P) fashion over the Internet without the need for centralised authentication or storage. These services can take the form of client installed applications or entirely web browser… ▽ More

    Submitted 2 October, 2015; originally announced October 2015.

    Comments: 15 pages; Proc. of Tenth ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2015)

  49. arXiv:1510.00651  [pdf, other

    cs.CR

    Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser

    Authors: Jason Farina, M-Tahar Kechadi, Mark Scanlon

    Abstract: In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website's source… ▽ More

    Submitted 2 October, 2015; originally announced October 2015.

    Journal ref: Journal of Digital Forensics, Security and Law (Proc. of 10th International Conference on Systematic Approaches to Digital Forensic Engineering, SADFE 2015)

  50. Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service

    Authors: Mark Scanlon, Jason Farina, M-Tahar Kechadi

    Abstract: High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google D… ▽ More

    Submitted 3 June, 2015; originally announced June 2015.

    Comments: in Computers and Security 2015

    ACM Class: K.6.m; C.2.1