Issa Traoré

Orcid: 0000-0003-2987-8047

Affiliations:
  • University of Victoria, Canada


According to our database1, Issa Traoré authored at least 136 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated Supervised Principal Component Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

2023
A Framework for Synthetic Agetech Attack Data Generation.
J. Cybersecur. Priv., October, 2023

SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place.
Sensors, August, 2023

Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System.
IEEE Syst. J., June, 2023

Classifier Calibration: With Application to Threat Scores in Cybersecurity.
IEEE Trans. Dependable Secur. Comput., 2023

On Statistical Learning of Branch and Bound for Vehicle Routing Optimization.
CoRR, 2023

Evaluating Permissioned Blockchain Using Stochastic Modeling and Chaos Engineering.
CoRR, 2023

Detecting BrakTooth Attacks.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Network Anomaly Detection Using a Graph Neural Network.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Bonet Detection Mechanism Using Graph Neural Network.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022

Intrusion Detection using a Graphical Fingerprint Model.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure.
IEEE Trans. Netw. Serv. Manag., 2021

UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring.
IEEE Trans. Inf. Forensics Secur., 2021

Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks.
IEEE Syst. J., 2021

Machine learning in precision medicine to preserve privacy via encryption.
Pattern Recognit. Lett., 2021

Preventing Data Loss by Harnessing Semantic Similarity and Relevance.
J. Internet Serv. Inf. Secur., 2021

Preventing Data Leak through Semantic Analysis.
Internet Things, 2021

Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021

Classifier Calibration: with implications to threat scores in cybersecurity.
CoRR, 2021

Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021

A Framework for Secure Logging in Precision Healthcare Cloud-based Services.
Proceedings of the IEEE International Conference on Digital Health, 2021

Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Towards an Epidemic SMS-based Cellular Botnet.
J. Internet Serv. Inf. Secur., 2020

Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring.
J. Comput. Secur., 2020

Secure remote anonymous user authentication scheme for smart home environment.
Internet Things, 2020

Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking.
Comput. Secur., 2020

When Agile Security Meets 5G.
IEEE Access, 2020

Malware Detection Using Machine Learning Models.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing.
Proceedings of the International Conference on Communications, 2020

A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords.
Secur. Priv., 2019

Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.
J. Inf. Secur. Appl., 2019

Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique.
Internet Things, 2019

Data Loss Prevention Using Document Semantic Signature.
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019

Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative.
Proceedings of the Machine Learning for Networking, 2019

Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT).
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Detecting Ransomware in Encrypted Web Traffic.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC).
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

A Framework Architecture for Agentless Cloud Endpoint Security Monitoring.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Automated Event Prioritization for Security Operation Center using Deep Learning.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
State of the art and perspectives on traditional and emerging biometrics: A survey.
Secur. Priv., 2018

Detecting opinion spams and fake news using text classification.
Secur. Priv., 2018

If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript.
Comput. Secur., 2018

Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

2017
Privacy information in a positive credit system.
Int. J. Grid Util. Comput., 2017

Authorship verification using deep belief network systems.
Int. J. Commun. Syst., 2017

Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

Detecting Broad Length Algorithmically Generated Domains.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

2016
Impact Study of a Mobile Botnet over LTE Networks.
J. Internet Serv. Inf. Secur., 2016

Creating Decision Trees from Rules using RBDT-1.
Comput. Intell., 2016

Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Improving vulnerability detection measurement: [test suites and software security assurance].
Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016

2015
Sliding window and control flow weight for metamorphic malware detection.
J. Comput. Virol. Hacking Tech., 2015

Authorship verification of e-mail and tweet messages applied for continuous authentication.
J. Comput. Syst. Sci., 2015

A framework for metamorphic malware analysis and real-time detection.
Comput. Secur., 2015

Annotated Control Flow Graph for Metamorphic Malware Detection.
Comput. J., 2015

SMS Botnet Detection for Android Devices through Intent Capture and Modeling.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Cloud Slicing a new architecture for cloud security monitoring.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015

A Game Theoretic Framework for Cloud Security Transparency.
Proceedings of the Network and System Security - 9th International Conference, 2015

Sharing Privacy Information in Credit Analysis Environment.
Proceedings of the Ninth International Conference on Complex, 2015

E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Biometric Recognition Based on Free-Text Keystroke Dynamics.
IEEE Trans. Cybern., 2014

Online risk-based authentication using behavioral biometrics.
Multim. Tools Appl., 2014

Verifying Online User Identity using Stylometric Analysis for Short Messages.
J. Networks, 2014

Current Trends and the Future of Metamorphic Malware Detection.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

In-Cloud Malware Analysis and Detection: State of the Art.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Detection and mitigation of malicious JavaScript using information flow control.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Continuous authentication using micro-messages.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Toward a Framework for Continuous Authentication Using Stylometry.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

Context-aware intrusion alerts verification approach.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2013
Biometric Authentication Using Mouse Gesture Dynamics.
IEEE Syst. J., 2013

Semantic aware attack scenarios reconstruction.
J. Inf. Secur. Appl., 2013

Botnet detection based on traffic behavior analysis and flow intervals.
Comput. Secur., 2013

MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013

Authorship verification for short messages using stylometry.
Proceedings of the International Conference on Computer, 2013

2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Software Performance Modeling using the UML: a Case Study.
J. Networks, 2012

Peer to Peer Botnet Detection Based on Flow Intervals.
Proceedings of the Information Security and Privacy Research, 2012

Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Extracting Attack Scenarios Using Intrusion Semantics.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

P2P Botnet Detection through Malicious Fast Flux Network Identification.
Proceedings of the 2012 Seventh International Conference on P2P, 2012

2011
Editorial: Adaptive Communication in Wireless Networks.
Wirel. Pers. Commun., 2011

Homogeneous physio-behavioral visual and mouse-based biometric.
ACM Trans. Comput. Hum. Interact., 2011

Application of contract-based security assertion monitoring framework for telecommunications software engineering.
Math. Comput. Model., 2011

The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review.
Proceedings of the Information Security and Assurance - International Conference, 2011

Detecting P2P botnets through network behavior analysis and machine learning.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Dynamic sample size detection in continuous authentication using sequential sampling.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

A semantic analysis approach to manage IDS alerts flooding.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features.
IEEE Trans. Syst. Man Cybern. Part A, 2010

Detecting Connection-Chains: A Data Mining Approach.
Int. J. Netw. Secur., 2010

Ontology-based Intelligent Network-Forensics Investigation.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Unsupervised Identity Application Fraud Detection using Rule-based Decision Tree.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010

Method ontology for intelligent network forensics analysis.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Double Spending Protection for E-Cash Based on Risk Management.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Distributed architectures for electronic cash schemes: a survey.
Int. J. Parallel Emergent Distributed Syst., 2009

RBDT-1: A New Rule-Based Decision Tree Generation Technique.
Proceedings of the Rule Interchange and Applications, International Symposium, 2009

A New Method for Learning Decision Trees from Rules.
Proceedings of the International Conference on Machine Learning and Applications, 2009

New Physiological Biometrics Based on Human Cognitive Factors.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Inverse Biometrics for mouse Dynamics.
Int. J. Pattern Recognit. Artif. Intell., 2008

Unsupervised anomaly detection using an evolutionary extension of k-means algorithm.
Int. J. Inf. Comput. Secur., 2008

E-Means: An Evolutionary Clustering Algorithm.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

Digital Fingerprinting Based on Keystroke Dynamics.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Contract-Based Security Monitors for Service Oriented Software Architecture.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Behavioral Biometrics for Online Computer User Monitoring.
Proceedings of the Image Pattern Recognition - Synthesis and Analysis in Biometrics, 2007

A New Biometric Technology Based on Mouse Dynamics.
IEEE Trans. Dependable Secur. Comput., 2007

Complexity Measures for Secure Service-Oriented Software Architectures.
Proceedings of the Third International Workshop on Predictor Models in Software Engineering, 2007

Mining and Detecting Connection-Chains in Network Traffic.
Proceedings of the Trust Management, 2007

Systematic Security Analysis for Service-Oriented Software Architectures.
Proceedings of ICEBE 2007, 2007

2006
Empirical relation between coupling and attackability in software systems: : a case study on DOS.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006

Integrated Security Verification and Validation: Case Study.
Proceedings of the LCN 2006, 2006

2005
Detecting Computer Intrusions Using Behavioral Biometrics.
Proceedings of the Third Annual Conference on Privacy, 2005

Measurement Framework for Software Privilege Protection Based on User Interaction Analysis.
Proceedings of the 11th IEEE International Symposium on Software Metrics (METRICS 2005), 2005

Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm.
Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), 2005

Experience with Engineering a Network Forensics System.
Proceedings of the Information Networking, 2005

A Prevention Model for Algorithmic Complexity Attacks.
Proceedings of the Detection of Intrusions and Malware, 2005

A New Evolutionary Algorithm for Determining the Optimal Number of Clusters.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Enhancing Structured Review with Model-Based Verification.
IEEE Trans. Software Eng., 2004

An integrated framework for formal development of open distributed systems.
Inf. Softw. Technol., 2004

Detecting New Forms of Network Intrusion Using Genetic Programming.
Comput. Intell., 2004

2003
A Protection Scheme for Collaborative Environments.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

A Transition-based Strategy for Object-oriented Software Testing.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

2002
Formal Analysis of an Agent-Based Medical Diagnosis Confirmation System: (Extended Abstract).
Proceedings of the Formal Approaches to Agent-Based Systems, Second International Workshop, 2002

2001
An Integrated V&V Environment for Critical Systems Development.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

2000
An Outline of PVS Semantics for UML Statecharts.
J. Univers. Comput. Sci., 2000

1997
Timing specification and rule-based systems.
Proceedings of the Ninth Euromicro Workshop on Real-Time Systems, 1997


  Loading...