default search action
Duc C. Le
Person information
- affiliation: Dalhousie University, Faculty of Computer Science, Halifax, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j5]Duc C. Le, Nur Zincir-Heywood:
Exploring anomalous behaviour detection and classification for insider threat identification. Int. J. Netw. Manag. 31(4) (2021) - [j4]Duc C. Le, Nur Zincir-Heywood:
Anomaly Detection for Insider Threats Using Unsupervised Ensembles. IEEE Trans. Netw. Serv. Manag. 18(2): 1152-1164 (2021) - [c11]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Training regime influences to semi-supervised learning for insider threat detection. SP (Workshops) 2021: 13-18 - 2020
- [j3]Duc C. Le, Nur Zincir-Heywood:
A Frontier: Dependable, Reliable and Secure Machine Learning for Network/System Management. J. Netw. Syst. Manag. 28(4): 827-849 (2020) - [j2]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning. IEEE Trans. Netw. Serv. Manag. 17(1): 30-44 (2020) - [c10]Duc C. Le, Nur Zincir-Heywood:
Exploring Adversarial Properties of Insider Threat Detection. CNS 2020: 1-9
2010 – 2019
- 2019
- [j1]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Unsupervised Monitoring of Networkand Service Behaviour Using SelfOrganizing Maps. J. Cyber Secur. Mobil. 8(1): 15-52 (2019) - [c9]Pedro Ferreira, Duc C. Le, Nur Zincir-Heywood:
Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat Detection. CNSM 2019: 1-7 - [c8]Duc C. Le, Nur Zincir-Heywood:
Learning From Evolving Network Data for Dependable Botnet Detection. CNSM 2019: 1-5 - [c7]Duc C. Le, Malcolm I. Heywood, Nur Zincir-Heywood:
Benchmarking genetic programming in dynamic insider threat detection. GECCO (Companion) 2019: 385-386 - [c6]Duc C. Le, Nur Zincir-Heywood:
Machine learning based Insider Threat Modelling and Detection. IM 2019: 1-6 - [c5]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Dynamic Insider Threat Detection Based on Adaptable Genetic Programming. SSCI 2019: 2579-2586 - [r1]Duc C. Le, Nur Zincir-Heywood:
Big Data in Network Anomaly Detection. Encyclopedia of Big Data Technologies 2019 - 2018
- [c4]Duc C. Le, Sara Khanchi, Nur Zincir-Heywood, Malcolm I. Heywood:
Benchmarking evolutionary computation approaches to insider threat detection. GECCO 2018: 1286-1293 - [c3]Duc C. Le, Nur Zincir-Heywood:
Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning. IEEE Symposium on Security and Privacy Workshops 2018: 270-275 - 2016
- [c2]Duc C. Le, Nur Zincir-Heywood, Malcolm I. Heywood:
Data analytics on network traffic flows for botnet behaviour detection. SSCI 2016: 1-7 - 2015
- [c1]Fariba Haddadi, Duc Le Cong, Laura Porter, Nur Zincir-Heywood:
On the Effectiveness of Different Botnet Detection Approaches. ISPEC 2015: 121-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint