Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Network forensics

  1. S. Saad, I. Traore, "Semantic-aware Attack Scenario Reconstruction", Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67.

  2. S. Saad, I. Traore, "Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis", Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.

  3. S. Saad, I. Traore, "Extracting Attack Scenarios Using Intrusion Semantics", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).

  4. S. Saad, I. Traore, "A Semantic-based Approach to Minimize IDS Alerts Flooding", 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).

  5. S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. "High Performance Proactive Digital Forensics". High Performance Computing Symposium (HPCS), Vancouver, 2012.

  6. S. Alharbi, J. Weber-Jahnke, I. Traore, "The proactive and reactive digital forensics investigation process: a systematic literature review", Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15 - 17, 2011, Brno, Czech Republic.

  7. S. Alharbi, J. H. Weber-Jahnke, and I. Traore. "The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review". International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.

  8. S. Saad, I. Traore, "A semantic analysis approach to manage IDS alerts flooding", Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).

  9. S. Saad, I. Traore, "Method ontology for intelligent network forensics analysis", Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).

  10. S. Saad, I. Traore, "Ontology-based intelligent network forensics", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).

  11. A. Almulhem, I. Traore, "Detecting connection chains: a data mining approach", to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.

  12. A. Almulhem, I. Traore, "Profiling distributed connection chains", International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.

  13. A. Almulhem and I. Traore, "A survey of connection chains detection techniques", in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).

  14. Almulhem A. and I. Traore, "Mining and detecting connections chains in network traffic", in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds).

  15. A. Almulhem and Issa Traore, "Experience with engineering a network forensics system", Lecture Notes in Computer Science, Springer-Verlag, 2005, (Proceedings of the International Conference on Information Networking (ICOIN2005), Jeju, Korea, Jan 2005). 

Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.