default search action
Issa Traoré
Person information
- affiliation: University of Victoria, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Effect of Text Augmentation and Adversarial Training on Fake News Detection. IEEE Trans. Comput. Soc. Syst. 11(4): 4775-4789 (2024) - [j54]William Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Federated Supervised Principal Component Analysis. IEEE Trans. Inf. Forensics Secur. 19: 646-660 (2024) - 2023
- [j53]Noel Khaemba, Issa Traoré, Mohammad Mamun:
A Framework for Synthetic Agetech Attack Data Generation. J. Cybersecur. Priv. 3(4): 744-757 (2023) - [j52]Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:
SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place. Sensors 23(15): 6752 (2023) - [j51]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System. IEEE Syst. J. 17(2): 3105-3116 (2023) - [j50]Waleed A. Yousef, Issa Traoré, William Briguglio:
Classifier Calibration: With Application to Threat Scores in Cybersecurity. IEEE Trans. Dependable Secur. Comput. 20(3): 1994-2010 (2023) - [c82]Aleksander Maksimoski, Isaac Woungang, Issa Traoré, Sanjay K. Dhurandher:
Bonet Detection Mechanism Using Graph Neural Network. AINA (2) 2023: 247-257 - [c81]Patrice Kisanga, Isaac Woungang, Issa Traoré, Glaucio H. S. Carvalho:
Network Anomaly Detection Using a Graph Neural Network. ICNC 2023: 61-65 - [c80]Achyuth Nandikotkur, Issa Traoré, Mohammad Mamun:
Detecting BrakTooth Attacks. SECRYPT 2023: 787-792 - [i6]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Saiful Islam Mamun, Issa Traoré:
Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering. CoRR abs/2301.07527 (2023) - [i5]Andrew A. Naguib, Waleed A. Yousef, Issa Traoré, Mohammad Saiful Islam Mamun:
On Statistical Learning of Branch and Bound for Vehicle Routing Optimization. CoRR abs/2310.09986 (2023) - 2022
- [c79]Chenyang Nie, Paulo Gustavo Quinan, Issa Traoré, Isaac Woungang:
Intrusion Detection using a Graphical Fingerprint Model. CCGRID 2022: 806-813 - [c78]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré, Periklis Chatzimisios:
Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure. ICC 2022: 847-852 - 2021
- [j49]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Preventing Data Leak through Semantic Analysis. Internet Things 14: 100073 (2021) - [j48]Hadeer Ahmed, Issa Traoré, Sherif Saad, Mohammad Mamun:
Automated detection of unstructured context-dependent sensitive information using deep learning. Internet Things 16: 100444 (2021) - [j47]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Preventing Data Loss by Harnessing Semantic Similarity and Relevance. J. Internet Serv. Inf. Secur. 11(2): 78-99 (2021) - [j46]William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Machine learning in precision medicine to preserve privacy via encryption. Pattern Recognit. Lett. 151: 148-154 (2021) - [j45]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks. IEEE Syst. J. 15(3): 3403-3414 (2021) - [j44]Waleed A. Yousef, Issa Traoré, William Briguglio:
UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring. IEEE Trans. Inf. Forensics Secur. 16: 5195-5210 (2021) - [j43]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure. IEEE Trans. Netw. Serv. Manag. 18(2): 1260-1274 (2021) - [c77]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. DASC/PiCom/CBDCom/CyberSciTech 2021: 51-59 - [c76]Parisa Moghaddam, Shahrear Iqbal, Issa Traoré:
A Framework for Secure Logging in Precision Healthcare Cloud-based Services. ICDH 2021: 212-214 - [c75]Paulo Gustavo Quinan, Issa Traoré, Ujwal Reddy Gondhi, Isaac Woungang:
Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events. MLN 2021: 117-130 - [i4]William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun:
Machine Learning in Precision Medicine to Preserve Privacy via Encryption. CoRR abs/2102.03412 (2021) - [i3]Waleed A. Yousef, Issa Traoré, William Briguglio:
Classifier Calibration: with implications to threat scores in cybersecurity. CoRR abs/2102.05143 (2021) - [i2]Shiv Sondhi, Sherif Saad, Kevin Shi, Mohammad Mamun, Issa Traoré:
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains. CoRR abs/2108.08441 (2021) - [i1]Waleed A. Yousef, Issa Traoré, William Briguglio:
UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring. CoRR abs/2111.10010 (2021) - 2020
- [j42]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
When Agile Security Meets 5G. IEEE Access 8: 166212-166225 (2020) - [j41]Abdulaziz Aldribi, Issa Traoré, Belaid Moa, Onyekachi Nwamuo:
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Comput. Secur. 88 (2020) - [j40]Moneer Fakroon, Mohammed Alshahrani, Fayez Gebali, Issa Traoré:
Secure remote anonymous user authentication scheme for smart home environment. Internet Things 9: 100158 (2020) - [j39]Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring. J. Comput. Secur. 28(3): 337-373 (2020) - [j38]Asem Kitana, Issa Traoré, Isaac Woungang:
Towards an Epidemic SMS-based Cellular Botnet. J. Internet Serv. Inf. Secur. 10(4): 38-58 (2020) - [c74]Amir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré:
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. AINA 2020: 845-857 - [c73]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing. CCCI 2020: 1-5 - [c72]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré, Leonard Barolli:
Malware Detection Using Machine Learning Models. NBiS 2020: 238-246
2010 – 2019
- 2019
- [j37]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet Things 7 (2019) - [j36]Mohammed Alshahrani, Issa Traoré:
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain. J. Inf. Secur. Appl. 45: 156-175 (2019) - [j35]Faisal Alshanketi, Issa Traoré, Ahmed Awad:
Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords. Secur. Priv. 2(1) (2019) - [c71]Nitika Gupta, Issa Traoré, Paulo Magella de Faria Quinan:
Automated Event Prioritization for Security Operation Center using Deep Learning. IEEE BigData 2019: 5864-5872 - [c70]Asem Ghaleb, Issa Traoré, Karim Ganame:
A Framework Architecture for Agentless Cloud Endpoint Security Monitoring. CNS 2019: 1-9 - [c69]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC). FiCloud 2019: 31-41 - [c68]Jaimin Modi, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed:
Detecting Ransomware in Encrypted Web Traffic. FPS 2019: 345-353 - [c67]Mohammed Alshahrani, Issa Traoré, Sherif Saad:
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History. FPS 2019: 387-397 - [c66]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). IoTSMS 2019: 185-194 - [c65]Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traoré, Isaac Woungang, Abdulaziz Aldribi:
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. MLN 2019: 315-332 - [c64]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Data Loss Prevention Using Document Semantic Signature. WIDECOM 2019: 75-99 - 2018
- [j34]Bassam Sayed, Issa Traoré, Amany Abdelhalim:
If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript. Comput. Secur. 75: 92-117 (2018) - [j33]Hadeer Ahmed, Issa Traoré, Sherif Saad:
Detecting opinion spams and fake news using text classification. Secur. Priv. 1(1) (2018) - [j32]Issa Traoré, Mohammed Alshahrani, Mohammad S. Obaidat:
State of the art and perspectives on traditional and emerging biometrics: A survey. Secur. Priv. 1(6) (2018) - [c63]Faisal Alshanketi, Issa Traoré, Awos Kanan, Ahmed Awad:
Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods. ISDDC 2018: 38-49 - [e2]Issa Traoré, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11317, Springer 2018, ISBN 978-3-030-03711-6 [contents] - 2017
- [j31]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat:
Authorship verification using deep belief network systems. Int. J. Commun. Syst. 30(12) (2017) - [j30]Marcelo Luiz Brocardo, Carlos Roberto De Rolt, Julio Da Silva Dias, Ricardo Felipe Custódio, Issa Traoré:
Privacy information in a positive credit system. Int. J. Grid Util. Comput. 8(1): 61-69 (2017) - [c62]Abdelraman Alenazi, Issa Traoré, Karim Ganame, Isaac Woungang:
Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. ISDDC 2017: 1-18 - [c61]Aashna Ahluwalia, Issa Traoré, Karim Ganame, Nainesh Agarwal:
Detecting Broad Length Algorithmically Generated Domains. ISDDC 2017: 19-34 - [c60]Hadeer Ahmed, Issa Traoré, Sherif Saad:
Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques. ISDDC 2017: 127-138 - [e1]Issa Traoré, Isaac Woungang, Ahmed Awad:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10618, Springer 2017, ISBN 978-3-319-69154-1 [contents] - 2016
- [j29]Amany Abdelhalim, Issa Traoré, Youssef Nakkabi:
Creating Decision Trees from Rules using RBDT-1. Comput. Intell. 32(2): 216-239 (2016) - [j28]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. J. Internet Serv. Inf. Secur. 6(2): 1-22 (2016) - [j27]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. J. Internet Serv. Inf. Secur. 6(3): 1-26 (2016) - [c59]Alexander M. Hoole, Issa Traoré, Aurélien Delaitre, Charles de Oliveira:
Improving vulnerability detection measurement: [test suites and software security assurance]. EASE 2016: 27:1-27:10 - [c58]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. MALWARE 2016: 20-30 - [c57]Faisal Alshanketi, Issa Traoré, Ahmed Awad E. Ahmed:
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication. IEEE Symposium on Security and Privacy Workshops 2016: 66-73 - 2015
- [j26]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Annotated Control Flow Graph for Metamorphic Malware Detection. Comput. J. 58(10): 2608-2621 (2015) - [j25]Shahid Alam, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar:
A framework for metamorphic malware analysis and real-time detection. Comput. Secur. 48: 212-233 (2015) - [j24]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 81(8): 1429-1440 (2015) - [j23]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 10(12): 675-683 (2015) - [j22]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, R. Nigel Horspool:
Sliding window and control flow weight for metamorphic malware detection. J. Comput. Virol. Hacking Tech. 11(2): 75-88 (2015) - [c56]Ssowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel:
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. AINA 2015: 29-36 - [c55]Marcelo Luiz Brocardo, Ricardo Felipe Custódio, Carlos Roberto De Rolt, Julio Da Silva Dias, Issa Traoré:
Sharing Privacy Information in Credit Analysis Environment. CISIS 2015: 491-496 - [c54]Abdulaziz Aldribi, Issa Traoré:
A Game Theoretic Framework for Cloud Security Transparency. NSS 2015: 488-500 - [c53]Abdulaziz Aldribi, Issa Traoré, Gabriel Letourneau:
Cloud Slicing a new architecture for cloud security monitoring. PACRIM 2015: 18-22 - [c52]Erik Johnson, Issa Traoré:
SMS Botnet Detection for Android Devices through Intent Capture and Modeling. SRDS Workshop 2015: 36-41 - 2014
- [j21]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 9(12): 3347-3355 (2014) - [j20]Issa Traoré, Isaac Woungang, Mohammad S. Obaidat, Youssef Nakkabi, Iris Lai:
Online risk-based authentication using behavioral biometrics. Multim. Tools Appl. 71(2): 575-605 (2014) - [j19]Ahmed A. Ahmed, Issa Traoré:
Biometric Recognition Based on Free-Text Keystroke Dynamics. IEEE Trans. Cybern. 44(4): 458-472 (2014) - [c51]Sherif Saad, Issa Traoré, Marcelo Luiz Brocardo:
Context-aware intrusion alerts verification approach. IAS 2014: 53-59 - [c50]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Toward a Framework for Continuous Authentication Using Stylometry. AINA 2014: 106-115 - [c49]Bassam Sayed, Issa Traoré:
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control. AINA Workshops 2014: 261-268 - [c48]Shahid Alam, R. Nigel Horspool, Issa Traoré:
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection. AINA 2014: 480-489 - [c47]Sanjay K. Dhurandher, Isaac Woungang, Issa Traoré:
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks. AINA Workshops 2014: 530-535 - [c46]Marcelo Luiz Brocardo, Issa Traoré:
Continuous authentication using micro-messages. PST 2014: 179-188 - [c45]Bassam Sayed, Issa Traoré, Amany Abdelhalim:
Detection and mitigation of malicious JavaScript using information flow control. PST 2014: 264-273 - [c44]Shahid Alam, Issa Traoré, Ibrahim Sogukpinar:
Current Trends and the Future of Metamorphic Malware Detection. SIN 2014: 411 - [c43]Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady:
In-Cloud Malware Analysis and Detection: State of the Art. SIN 2014: 473 - 2013
- [j18]David Zhao, Issa Traoré, Bassam Sayed, Wei Lu, Sherif Saad, Ali A. Ghorbani, Daniel Garant:
Botnet detection based on traffic behavior analysis and flow intervals. Comput. Secur. 39: 2-16 (2013) - [j17]Sherif Saad, Issa Traoré:
Semantic aware attack scenarios reconstruction. J. Inf. Secur. Appl. 18(1): 53-67 (2013) - [j16]Bassam Sayed, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat:
Biometric Authentication Using Mouse Gesture Dynamics. IEEE Syst. J. 7(2): 262-274 (2013) - [c42]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Authorship verification for short messages using stylometry. CITS 2013: 1-6 - [c41]Isaac Woungang, Mohammad S. Obaidat, Sanjay Kumar Dhurandher, Issa Traoré:
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks. CITS 2013: 1-5 - [c40]Shahid Alam, R. Nigel Horspool, Issa Traoré:
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. SIN 2013: 233-240 - 2012
- [j15]Issa Traoré, Isaac Woungang, Ahmed Awad El Sayed Ahmed, Mohammad S. Obaidat:
Software Performance Modeling using the UML: a Case Study. J. Networks 7(1): 4-20 (2012) - [j14]Issa Traoré, Isaac Woungang, Youssef Nakkabi, Mohammad S. Obaidat, Ahmed Awad E. Ahmed, Bijan Khalilian:
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication. IEEE Trans. Syst. Man Cybern. Part B 42(5): 1343-1356 (2012) - [c39]David Zhao, Issa Traoré:
P2P Botnet Detection through Malicious Fast Flux Network Identification. 3PGCIC 2012: 170-175 - [c38]Sherif Saad, Issa Traoré:
Extracting Attack Scenarios Using Intrusion Semantics. FPS 2012: 278-292 - [c37]Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré:
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. FPS 2012: 308-323 - [c36]Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo, Issa Traoré:
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks. GLOBECOM Workshops 2012: 1037-1041 - [c35]David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu:
Peer to Peer Botnet Detection Based on Flow Intervals. SEC 2012: 87-102 - 2011
- [j13]Alexander M. Hoole, Issa Traoré, Isabelle Simplot-Ryl:
Application of contract-based security assertion monitoring framework for telecommunications software engineering. Math. Comput. Model. 53(3-4): 522-537 (2011) - [j12]Omar Hamdy, Issa Traoré:
Homogeneous physio-behavioral visual and mouse-based biometric. ACM Trans. Comput. Hum. Interact. 18(3): 12:1-12:30 (2011) - [j11]Sudip Misra, Issa Traoré, Wei Song:
Editorial: Adaptive Communication in Wireless Networks. Wirel. Pers. Commun. 56(3): 353-357 (2011) - [c34]Sherif Saad, Issa Traoré:
A semantic analysis approach to manage IDS alerts flooding. IAS 2011: 156-161 - [c33]Ahmed Awad E. Ahmed, Issa Traoré:
Dynamic sample size detection in continuous authentication using sequential sampling. ACSAC 2011: 169-176 - [c32]Sherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian:
Detecting P2P botnets through network behavior analysis and machine learning. PST 2011: 174-180 - [c31]Soltan Alharbi, Jens H. Weber-Jahnke, Issa Traoré:
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. ISA 2011: 87-100 - 2010
- [j10]Ahmad Almulhem, Issa Traoré:
Detecting Connection-Chains: A Data Mining Approach. Int. J. Netw. Secur. 10(1): 62-74 (2010) - [j9]Youssef Nakkabi, Issa Traoré, Ahmed Awad E. Ahmed:
Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features. IEEE Trans. Syst. Man Cybern. Part A 40(6): 1345-1353 (2010) - [c30]Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré:
Double Spending Protection for E-Cash Based on Risk Management. ISC 2010: 394-408 - [c29]Sherif Saad, Issa Traoré:
Method ontology for intelligent network forensics analysis. PST 2010: 7-14 - [c28]Amany Abdelhalim, Issa Traoré:
Unsupervised Identity Application Fraud Detection using Rule-based Decision Tree. SEDE 2010: 261-268 - [c27]Sherif Saad, Issa Traoré:
Ontology-based Intelligent Network-Forensics Investigation. SEDE 2010: 313-319
2000 – 2009
- 2009
- [j8]Isabelle Simplot-Ryl, Issa Traoré, Patricia Everaere:
Distributed architectures for electronic cash schemes: a survey. Int. J. Parallel Emergent Distributed Syst. 24(3): 243-271 (2009) - [c26]Omar Hamdy, Issa Traoré:
New Physiological Biometrics Based on Human Cognitive Factors. CISIS 2009: 910-917 - [c25]Amany Abdelhalim, Issa Traoré:
A New Method for Learning Decision Trees from Rules. ICMLA 2009: 693-698 - [c24]Amany Abdelhalim, Issa Traoré, Bassam Sayed:
RBDT-1: A New Rule-Based Decision Tree Generation Technique. RuleML 2009: 108-121 - 2008
- [j7]Wei Lu, Issa Traoré:
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm. Int. J. Inf. Comput. Secur. 2(2): 107-139 (2008) - [j6]Akif Nazar, Issa Traoré, Ahmed Awad E. Ahmed:
Inverse Biometrics for mouse Dynamics. Int. J. Pattern Recognit. Artif. Intell. 22(3): 461-495 (2008) - [c23]Yanguo Liu, Issa Traoré, Alexander M. Hoole:
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures. APSCC 2008: 1231-1238 - [c22]Alexander M. Hoole, Issa Traoré:
Contract-Based Security Monitors for Service Oriented Software Architecture. APSCC 2008: 1239-1245 - [c21]Ahmed Awad E. Ahmed, Issa Traoré, Almulhem Ahmed:
Digital Fingerprinting Based on Keystroke Dynamics. HAISA 2008: 94-104 - [c20]Wei Lu, Hengjian Tong, Issa Traoré:
E-Means: An Evolutionary Clustering Algorithm. ISICA 2008: 537-545 - 2007
- [j5]Ahmed Awad E. Ahmed, Issa Traoré:
A New Biometric Technology Based on Mouse Dynamics. IEEE Trans. Dependable Secur. Comput. 4(3): 165-179 (2007) - [c19]Yanguo Liu, Issa Traoré:
Systematic Security Analysis for Service-Oriented Software Architectures. ICEBE 2007: 612-621 - [c18]Ahmad Almulhem, Issa Traoré:
Mining and Detecting Connection-Chains in Network Traffic. IFIPTM 2007: 47-57 - [c17]Michael Yanguo Liu, Issa Traoré:
Complexity Measures for Secure Service-Oriented Software Architectures. PROMISE@ICSE 2007: 11 - [p1]Ahmed Awad E. Ahmed, Issa Traoré:
Behavioral Biometrics for Online Computer User Monitoring. Image Pattern Recognition 2007: 243-268 - 2006
- [c16]Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl, Yanguo Liu, Issa Traoré:
Integrated Security Verification and Validation: Case Study. LCN 2006: 1000-1007 - [c15]Michael Yanguo Liu, Issa Traoré:
Empirical relation between coupling and attackability in software systems: : a case study on DOS. PLAS 2006: 57-64 - 2005
- [c14]Wei Lu, Issa Traoré:
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. CANS 2005: 96-109 - [c13]Wei Lu, Issa Traoré:
A New Evolutionary Algorithm for Determining the Optimal Number of Clusters. CIMCA/IAWTIC 2005: 648-653 - [c12]Suraiya Khan, Issa Traoré:
A Prevention Model for Algorithmic Complexity Attacks. DIMVA 2005: 160-173 - [c11]Ahmad Almulhem, Issa Traoré:
Experience with Engineering a Network Forensics System. ICOIN 2005: 62-71 - [c10]Wei Lu, Issa Traoré:
Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm. ICTAI 2005: 712-713 - [c9]Michael Yanguo Liu, Issa Traoré:
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. IEEE METRICS 2005: 10 - [c8]Ahmed Awad E. Ahmed, Issa Traoré:
Detecting Computer Intrusions Using Behavioral Biometrics. PST 2005 - 2004
- [j4]Wei Lu, Issa Traoré:
Detecting New Forms of Network Intrusion Using Genetic Programming. Comput. Intell. 20(3): 475-494 (2004) - [j3]Issa Traoré, Demissie B. Aredo, Hong Ye:
An integrated framework for formal development of open distributed systems. Inf. Softw. Technol. 46(5): 281-286 (2004) - [j2]Issa Traoré, Demissie B. Aredo:
Enhancing Structured Review with Model-Based Verification. IEEE Trans. Software Eng. 30(11): 736-753 (2004) - 2003
- [c7]Wei Lu, Issa Traoré:
Detecting new forms of network intrusion using genetic programming. IEEE Congress on Evolutionary Computation 2003: 2165-2172 - [c6]Issa Traoré, Suraiya Khan:
A Protection Scheme for Collaborative Environments. SAC 2003: 331-337 - [c5]Issa Traoré:
A Transition-based Strategy for Object-oriented Software Testing. SAC 2003: 1055-1062 - [c4]Issa Traoré, Demissie B. Aredo, Hong Ye:
An Integrated Framework for Formal Development of Open Distributed Systems. SAC 2003: 1078-1085 - 2002
- [c3]Alexander M. Hoole, Issa Traoré, Michael Yanguo Liu:
Formal Analysis of an Agent-Based Medical Diagnosis Confirmation System: (Extended Abstract). FAABS 2002: 292-293 - 2001
- [c2]Issa Traoré:
An Integrated V&V Environment for Critical Systems Development. RE 2001: 287 - 2000
- [j1]Issa Traoré:
An Outline of PVS Semantics for UML Statecharts. J. Univers. Comput. Sci. 6(11): 1088-1108 (2000)
1990 – 1999
- 1997
- [c1]P. D. Zijderveld, Issa Traoré, Rob A. Vingerhoeds, Abd-El-Kader Sahraoui:
Timing specification and rule-based systems. RTS 1997: 177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint