Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Intrusion detection

  1. Sherif Saad; Issa Traore; Marcelo Luiz Brocardo. "Context-aware intrusion alerts verification approach", 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.
  2. W. Lu and I. Traore, "Unsupervised anomaly detection using an evolutionary extension of k-means algorithm", International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.
  3. W. Lu, I. Traore, "A genetic EM algorithm for learning the optimal number of components of mixture models", WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).
  4. W. Lu, I. Traore, "A novel evolutionary clustering algorithm based on Gaussian mixture model", Proceedings of the 10th WSEAS International Conference on Computers, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006.
  5. S. Khan and I. Traore, "Queue based analysis of DoS attacks", Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2005, pp. 266-273.
  6. Khan, S., and I. Traore, "A prevention model for algorithmic complexity attacks", Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.
  7. W. Lu, I. Traore, "A new evolutionary algorithm for determining the optimal number of clusters", IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna – Austria.
  8. W. Lu and I. Traore, "An unsupervised approach for detecting DDOS attacks based on traffic-based metrics", IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Pages: 462-465, Victoria, BC, August 2005.
  9. W. Lu and I. Traore, "An unsupervised anomaly detection framework for network intrusions", Technical Report ECE-05-2, Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, October 2005.
  10. W. Lu, I. Traore, "Determining the optimal number of clusters using a new evolutionary algorithm", 17th IEEE International Conference on Tools with Artificial Intelligence, 14-16 November, Hong-Kong.
  11. W. Lu, I. Traore, "A novel unsupervised anomaly detection framework for detecting network attacks in real-time", 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmedt et al. (Eds.).
  12. W. Lu, I. Traore, "Detecting new forms of network intrusions using genetic programming", Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA & Oxford UK.
Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.