Issa Traoré
Orcid: 0000-0003-2987-8047Affiliations:
- University of Victoria, Canada
According to our database1,
Issa Traoré
authored at least 137 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on ece.uvic.ca
On csauthors.net:
Bibliography
2024
IEEE Trans. Comput. Soc. Syst., August, 2024
IEEE Trans. Inf. Forensics Secur., 2024
2023
J. Cybersecur. Priv., October, 2023
SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place.
Sensors, August, 2023
Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System.
IEEE Syst. J., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
2022
Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring.
IEEE Trans. Inf. Forensics Secur., 2021
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks.
IEEE Syst. J., 2021
Pattern Recognit. Lett., 2021
J. Internet Serv. Inf. Secur., 2021
Automated detection of unstructured context-dependent sensitive information using deep learning.
Internet Things, 2021
CoRR, 2021
Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021
Proceedings of the IEEE International Conference on Digital Health, 2021
Chaos Engineering For Understanding Consensus Algorithms Performance in Permissioned Blockchains.
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Multilayer ransomware detection using grouped registry key operations, file entropy and file signature monitoring.
J. Comput. Secur., 2020
Internet Things, 2020
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking.
Comput. Secur., 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing.
Proceedings of the International Conference on Communications, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
Multimodal mobile keystroke dynamics biometrics combining fixed and variable passwords.
Secur. Priv., 2019
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.
J. Inf. Secur. Appl., 2019
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique.
Internet Things, 2019
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative.
Proceedings of the Machine Learning for Networking, 2019
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT).
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC).
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Secur. Priv., 2018
Comput. Secur., 2018
Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018
2017
Int. J. Commun. Syst., 2017
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017
2016
J. Internet Serv. Inf. Secur., 2016
Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Improving vulnerability detection measurement: [test suites and software security assurance].
Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016
2015
J. Comput. Virol. Hacking Tech., 2015
Authorship verification of e-mail and tweet messages applied for continuous authentication.
J. Comput. Syst. Sci., 2015
Comput. Secur., 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Proceedings of the IEEE Pacific Rim Conference on Communications, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Ninth International Conference on Complex, 2015
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
IEEE Trans. Cybern., 2014
Multim. Tools Appl., 2014
J. Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 10th International Conference on Information Assurance and Security, 2014
2013
Comput. Secur., 2013
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012
Proceedings of the Information Security and Privacy Research, 2012
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012
Proceedings of the 2012 Seventh International Conference on P2P, 2012
2011
ACM Trans. Comput. Hum. Interact., 2011
Application of contract-based security assertion monitoring framework for telecommunications software engineering.
Math. Comput. Model., 2011
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review.
Proceedings of the Information Security and Assurance - International Conference, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Dynamic sample size detection in continuous authentication using sequential sampling.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Improving Mouse Dynamics Biometric Performance Using Variance Reduction via Extractors With Separate Features.
IEEE Trans. Syst. Man Cybern. Part A, 2010
Ontology-based Intelligent Network-Forensics Investigation.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010
Unsupervised Identity Application Fraud Detection using Rule-based Decision Tree.
Proceedings of the ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
Proceedings of the Information Security - 13th International Conference, 2010
2009
Int. J. Parallel Emergent Distributed Syst., 2009
Proceedings of the Rule Interchange and Applications, International Symposium, 2009
Proceedings of the International Conference on Machine Learning and Applications, 2009
Proceedings of the 2009 International Conference on Complex, 2009
2008
Int. J. Pattern Recognit. Artif. Intell., 2008
Int. J. Inf. Comput. Secur., 2008
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Image Pattern Recognition - Synthesis and Analysis in Biometrics, 2007
IEEE Trans. Dependable Secur. Comput., 2007
Proceedings of the Third International Workshop on Predictor Models in Software Engineering, 2007
Proceedings of the Trust Management, 2007
Proceedings of ICEBE 2007, 2007
2006
Empirical relation between coupling and attackability in software systems: : a case study on DOS.
Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, 2006
Proceedings of the LCN 2006, 2006
2005
Proceedings of the Third Annual Conference on Privacy, 2005
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis.
Proceedings of the 11th IEEE International Symposium on Software Metrics (METRICS 2005), 2005
Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), 2005
Proceedings of the Information Networking, 2005
Proceedings of the Detection of Intrusions and Malware, 2005
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
IEEE Trans. Software Eng., 2004
Inf. Softw. Technol., 2004
Comput. Intell., 2004
2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
2002
Formal Analysis of an Agent-Based Medical Diagnosis Confirmation System: (Extended Abstract).
Proceedings of the Formal Approaches to Agent-Based Systems, Second International Workshop, 2002
2001
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001
2000
1997
Proceedings of the Ninth Euromicro Workshop on Real-Time Systems, 1997