Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Biometrics Technologies

  1. Alshanketi F., Traore I., and A. Awad, “Multimodal Mobile Keystroke Dynamics Biometrics Combining Fixed and Variable passwords”, Journal of Security & Privacy, Wiley, Volume 2, Issue 1, January/February 2019.

  2. Traore I., M. Alshaharani, M. Obaidat, “State of the Art and Perspectives on Traditional and Emerging Biometrics: A Survey”, Journal of Security and Privacy, Wiley, Vol. 1 Issue 6, November/December 2018.

  3. M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, “Authorship Verification Using Deep Belief Network Systems”, International Journal of Communication Systems, Wiley, Volume 30, Issue 12, August 2017.

  4. I. Traore, Y. Nakkabi, S. Saad, B. Sayed, J. D. Ardigo, "Ensuring Online Exam Integrity through Continuous Biometric Authentication", 1st Information Security Assurance and Trust Workshop (I-SAT 2016), Vancouver, BC, Canada, June 2016.

  5. F. Alshanketi, I. Traore, A. Awad Ahmed, "Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication", Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016), co-located with 37th IEEE Security & Privacy Symposium (IEEE S&P 2016), May 26, 2016, San Jose, CA, USA.I.

  6. I. Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, and I. Lai, “Online Risk-based Authentication using Behavioral Biometrics”, Journal of Multimedia Tools and Applications, Springer, July 2014, 71(2): 575-605.

  7. Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang. "Verifying Online User Identity using Stylometric Analysis for Short Messages", Journal of Networks 9, no. 12 (2014): 3347-3355.

  8. Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang. "Authorship verification of e-mail and tweet messages applied for continuous authentication", Journal of Computer and System Sciences, Available online 29 December 2014, ISSN 0022-0000.

  9. Marcelo Luiz Brocardo, Issa Traore. "Continuous Authentication using Micro-Messages", Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014.

  10. Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang. "Toward a Framework for Continuous Authentication using Stylometry", The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13, 2014.

  11. A.A.E, Ahmed, I. Traore, "Free Text Recognition of Keystrokes", IEEE Transactions on Cybernetics, Vol. 44 No. 4, April 2014, pp. 458-472 (14 pages).

  12. B. Sayed, I. Traore, I Woungang, M.S. Obaidat, "Static Authentication based on Mouse Gestures", IEEE Systems Journal, Vol. 7, No.2, June 2013, pages 262-274.

  13. I. Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, and B. Khalilian, "Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication", IEEE Transactions on Systems, Man, and Cybernetics Part B, Vol. 42 No. 5, October 2012, pages 1343-1356.

  14. Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang, "Authorship Verification for Short Messages Using Stylometry", Proc. of the IEEE Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2013), Piraeus-Athens, Greece, May 7-8, 2013 (Best Paper Award).

  15. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, "Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments", 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, (8 pages).

  16. A. Ahmed, I. Traore, "Dynamic sample size detection in continuous authentication using sequential sampling", Proceedings of Annual Computer Security Applications Conference (ACSAC), Dec. 5-9, 2011, Orlando, Florida, USA.

  17. I. Traore, A. A. E. Ahmed (Editors), "Continuous authentication based on biometrics: data, models, and metrics", IGI Publishing, (294 pages), ISBN 978-1-61350-129, 2012.

  18. I. Traore, A. A. E. Ahmed, "Introduction to continuous authentication", in Continuous Authentication based on Biometrics: Data, Models, and Metrics, I. Traore and A. Ahmed (Eds.), IGI Publishing, pages 1-12, ISBN 978-1-61350-129, 2012.

  19. I. Traore, A. A. E. Ahmed, "Performance metrics and models for continuous authentication systems", in Continuous Authentication based on Biometrics: Data, Models, and Metrics, IGI Publishing, I. Traore and A. Ahmed (Eds.), pages 23-39, IGI Publishing, ISBN 978-1-61350-129, 2012.

  20. O. Hamdy, I. Traore, "Homogenous physio-behavioral visual and mouse biometric", ACM Transactions on Computer Human Interactions, Volume 18 Issue 3, July 2011. (30 pages).

  21. Y. Nakkabi, I. Traore, A. A. E. Ahmed, "Improving mouse dynamics biometric performance using variance reduction with separate extractors", IEEE Transactions on Systems, Man and Cybernetics-Part A: Systems and Humans, Vol. 40, No. 6, pages 1345-1353, November 2010.

  22. A. A. E. Ahmed, I. Traore, "Mouse dynamics biometric technology", accepted to be published as a chapter in Behavioral Biometrics for Human Identification: Intelligent Applications, L. Wang and X. Geng (Eds.), IGI Publishing, (19 pages), (under press).

  23. O. Mohamed, I. Traore, "Cognitive-based biometrics system for static user authentication", in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice/Mestre, Italy.

  24. O. Mohamed, I. Traore, "New physiological biometrics based on human cognitive factors", in the Proceedings of the International Workshop on Biometrics, Technology and Personalized Medicine, co-located with the International Conference on Complex, Intelligent, and Software Intensive Systems (CSIS), March-19, 2009, Fukoka, Japan, (7 pages).

  25. A. A. E. Ahmed and I. Traore, "Employee surveillance based on free text detection of keystroke dynamics", (Chapter III), Handbook of Research on Social and Organizational Liabilities in Information Security, Manish Gupta and Raj Sharman (Eds.), Idea Group Publishing, pages 47-63, 2008.

  26. A. Ahmed, I. Traore, A. Almulhem, "Digital fingerprinting based on keystroke dynamics", Proceedings of 2nd International Symposium on Human Aspects of Information Security and Assurance (HAISA), 8-9 July 2008, Plymouth, UK, (10 pages).

  27. A. Nazar, I. Traore, A.A.E. Ahmed, "Inverse biometrics for mouse dynamics", International Journal of Artificial Intelligence and Pattern Recognition (IJPRAI), Volume 22, Issue 3, May 2008, pp. 461-495.

  28. Ahmed A. A. E., I. Traore, "A new biometrics technology based on mouse dynamics", IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, July-September 2007, pp. 165-179.

  29. A.A.E. Ahmed, I. Traore, "Behavioral biometrics for online computer user monitoring", Image Pattern Recognition: Synthesis and Analysis in Biometrics, S. Yanushkevich et al. (Eds.), World Scientific Publishing, pp. 141-161, (21 pages); May 2007.

  30. A.E. Ahmed, I. Traore, "Anomaly intrusion detection based on biometrics", Proceedings of 6th IEEE Information Assurance Workshop, 15-17 June, West Point, New York, USA.

  31. Awad, A., and I. Traore, "Detecting computer intrusions using behavioral biometrics", 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, pp. 91-98, October 12-14, 2005.

Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.