Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Botnet/Malware detection

  1. Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed, “Multilayer Ransomware Detection using Grouped Registry Key Operations, File Entropy and File Signature Monitoring” Journal of Computer Security, Volume 28, Number 3, 2020, pages 337-373.

  2. Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. “Detecting Ransomware in Encrypted Web Traffic”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.

  3. Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham

  4. Alenazi A., Traore I., Ganame K., Woungang I. (2017) Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham

  5. A. Kitana, I. Traore, I. Woungang, "Impact Study of a Mobile Botnet over LTE Networks", Journal of Internet Services and Information Security, Vol. 6, No. 2, pages 1-22, May 2016.

  6. A. Kitana, I. Traore, I. Woungang, "Impact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network", 11th International Conference on Malicious and Unwanted Software (MALCON) 2016, October 18-21, 2016, Fajardo, Puerto Rico.

  7. E. Johnson, I. Traore, "SMS Botnet Detection for Android Devices through Intent Capture and Modeling", 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshops, pages 36-41, Sept. 28 2015-Oct. 1 2015, Montreal, Quebec, Canada

  8. Alam, S.; Sogukpinar, I.; Traore, I; Horspool, N. R., “Sliding window of difference and control flow weight for metamorphic malware detection”, Journal of Computer Virology and Hacking Techniques, Springer, May 2015, Volume 11, Issue 2, pp 75–88.

  9. S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.

  10. S. Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015

  11. S. Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.

  12. Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., “In-Cloud Malware Analysis and Detection: State of the Art”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.


  13. Alam, S.; Traore, I.; Sogukpinar, I., “Current Trends and the Future of Metamorphic Malware Detection”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.

  14. D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, "Botnet Detection based on Traffic Behavior Analysis and Flow Intervals", Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.

  15. S. Alam, N. Horspool, I. Traore, "MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection", Accepted, Proc. of 6th ACM International Conference on Security of Information and Networks (SIN 2013), November 26-28, 2013, Aksaray, Turkey.

  16. D. Zhao, I. Traore, "P2P Botnet Detection through Malicious Fast Flux Network Identification", 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing -3PGCIC 2012, November 12-14, 2012, Victoria, BC, Canada, (6 pages). 

  17. David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. "Peer to Peer Botnet Detection Based on Flow Intervals". Information Security and Privacy Research, IFIP Advances in Information and Communication Technology Volume 376, 2012, pp 87-102. 

  18. Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, "Detecting P2P botnets through network behavior analysis and machine learning", Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).

Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.