Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Conferences

  1. Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. “Detecting Ransomware in Encrypted Web Traffic”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.

  2. Mohammed Alshahrani, Issa Traore, and Sherif Saad. (2019). “Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.

  3. Mohammed Alshahrani, Issa Traore. (2019). Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). The 6th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain.

  4. Alshahrani M., I. Traore, I. Woungang, “Anonymous IoT Mutual Inter-device Authentication Scheme based on Incremental Counter”, the 7th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2019), 26-28 August 2019, Istanbul, Turkey.

  5. Asem Ghaleb, Issa Traore, Karim Ganame, “A Framework Architecture for Agentless Cloud Endpoint Security Monitoring”, 2019 IEEE Conference on Communications and Network Security (CNS): Workshops: SPC: 5th IEEE Workshop on Security and Privacy in the Cloud, 10-12 June 2019, Washington DC, USA.

  6. Hanan Alhindi, Issa Traore, and Isaac Woungang, “Data Loss Prevention Using Document Semantic Signature”, International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, Feb 11-13, 2019, Springer, Best paper award.

  7. Ahmed H., Traore I., Saad S. (2017) Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham

  8. Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham 

  9. Alenazi A., Traore I., Ganame K., Woungang I. (2017) Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham 

  10. A. Kitana, I. Traore, I. Woungang, “Impact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network”, 11th International Conference on Malicious and Unwanted Software (MALCON) 2016, October 18-21, 2016, Fajardo, Puerto Rico. 

  11. A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, “Improving Vulnerabilities Detection Measurement – Test Suites and Software Security Assurance”, 20th ACM International Conference on Evaluation and Assessment in Software Engineering (EASE ’16), June 01 - 03, 2016, Limerick, Ireland.

  12. I. Traore, Y. Nakkabi, S. Saad, B. Sayed, J. D. Ardigo, “Ensuring Online Exam Integrity through Continuous Biometric Authentication”, 1st Information Security Assurance and Trust Workshop (I-SAT 2016), Vancouver, BC, Canada, June 2016.

  13. F. Alshanketi, I. Traore, A. Awad Ahmed, “Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication”, Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016), co-located with 37th IEEE Security & Privacy Symposium (IEEE S&P 2016), May 26, 2016, San Jose, CA, USA.

  14. M. Brocardo, R.F. Custodio, C.R. De Rolt, J.D.S. Dias, Julio Da Silva, and I. Traore, “Sharing Privacy Information in Credit Analysis Environment”, 9th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), 2015, Florianopolis, Santa Catarina, Brazil.

  15. A. Aldribi, I. Traore, “A Game Theoretic Framework for Cloud Security Transparency”, 10th International Conference on Network and System Security (NSS 2015), November 3-5, New York, NY, USA, Volume 9408 of the series Lecture Notes in Computer Science, pages 488-500.

  16. A. Aldribi, G. Letourneau , I. Traore, “Cloud Slicing - A  new Architecture for Cloud Security Monitoring”, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2015

  17. E. Johnson, I. Traore, “SMS Botnet Detection for Android Devices through Intent Capture and Modeling”, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshops, pages 36-41, Sept. 28 2015-Oct. 1 2015, Montreal, Quebec, Canada

  18.  S. Hari Shankar, I. Woungang, S. K. Dhurandher, I. Traore, S.B. Kaleel, “E-MAntNet: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks”,  29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015) , Gwangju, Korea, March 25-27, 2015.

  19. S. Saad, I. Traore, M.L. Brocardo, "Context-Aware Intrusion Alerts Verification Approach" The 10th International Conference on Information Assurance and Security (IAS 2014), Okinawa, Japan, 27-29 November 2014.

  20. Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., “In-Cloud Malware Analysis and Detection: State of the Art”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.

  21. Alam, S.; Traore, I.; Sogukpinar, I., “Current Trends and the Future of Metamorphic Malware Detection”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.

  22. B. Sayed, I. Traore, A. Abdelhalim, “Detection and Mitigation of Malicious JavaScript Using Information Flow Control”, 12th Annual Conference on Privacy, Security and Trust (PST2014), Toronto, Ontario, Canada, July 22-24, 2014.

  23.  I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, “Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments”, 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, pages 138-145

  24. Sherif Saad; Issa Traore; Marcelo Luiz Brocardo. "Context-aware intrusion alerts verification approach", 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.

  25. Marcelo Luiz Brocardo, Issa Traore. "Continuous Authentication using Micro-Messages", Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014.

  26. Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang. "Toward a Framework for Continuous Authentication using Stylometry", The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13, 2014.

  27. B. Sayed, I. Traore, “Information Flow Control Model for Protection against Web 2.0 Client-side Web Attacks”, 10th International Symposium on Frontiers of Information Systems and Network Applications (FINA 2014) co-located with 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.

  28. S. Alam, N. Horpool, I. Traore, “MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection”, 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.

  29. S. K. Dhurandher, I. Woungang, I. Traore, “C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks”, 10th International Workshop on Heterogeneous Wireless Networks (HWISE2014) of AINA2014.

  30. S. Alam, N. Horspool, I. Traore, "MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection", Accepted, Proc. of 6th ACM International Conference on Security of Information and Networks (SIN 2013), November 26-28, 2013, Aksaray, Turkey.

  31. Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang, "Authorship Verification for Short Messages Using Stylometry", Proc. of the IEEE Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2013), Piraeus-Athens, Greece, May 7-8, 2013 (Best Paper Award).

  32. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, "Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments", 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, (8 pages).

  33. I. Woungang, S. K. Dhurandher, V. Koo, and I. Traore, “'Comparison of Two Security Protocols for Preventing Packet Dropping and Message Tampering Attacks on AODV-Based Mobile Ad Hoc Networks”, 4th IEEE International Workshop on Mobility Management in the Networks of the Future World (IEEE GlobeCom -MobiWorld 2012), December 3-7 2012, Anaheim, CA, USA, (7 pages).

  34. S. Saad, I. Traore, "Extracting Attack Scenarios Using Intrusion Semantics", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).

  35. I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, "Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26, Montreal, QC, Canada.

  36. D. Zhao, I. Traore, "P2P Botnet Detection through Malicious Fast Flux Network Identification", 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing -3PGCIC 2012, November 12-14, 2012, Victoria, BC, Canada, (6 pages).

  37. S. Alharbi, B. Moa, J. Weber-Jahnke, I. Traore, "High-Performance Proactive Digital Forensics", High Performance Computing System Conference – HPCS 2012, Vancouver, BC, Canada, May 1-3, 2012, (15 pages).

  38. S. Saad, I. Traore, "A Semantic-based Approach to Minimize IDS Alerts Flooding", 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).

  39. David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. "Peer to Peer Botnet Detection Based on Flow Intervals". Information Security and Privacy Research, IFIP Advances in Information and Communication Technology Volume 376, 2012, pp 87-102.

  40. S. Saad, I. Traore, "A semantic analysis approach to manage IDS alerts flooding", Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).

  41. A. Ahmed, I. Traore, "Dynamic sample size detection in continuous authentication using sequential sampling", Proceedings of Annual Computer Security Applications Conference (ACSAC), Dec. 5-9, 2011, Orlando, Florida, USA.

  42. S. Alharbi, J. Weber-Jahnke, I. Traore, "The proactive and reactive digital forensics investigation process: a systematic literature review", Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15-17, 2011, Brno, Czech Republic.

  43. Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, "Detecting P2P botnets through network behavior analysis and machine learning", Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).

  44. S. Saad, I. Traore, "Method ontology for intelligent network forensics analysis", Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).

  45. P. Everaere, I. Simplot-Ryl, I. Traore, "Double spending protection for e-cash based on risk management", Proceedings of 13th Information Security Conference (ISC), October 25-28, 2010, Boca Raton, Florida, USA; Lecture Notes in Computer Science, vol. 6531, pp. 394-408 (8 pages).

  46. I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, "UML-based performance modeling of dstributed software systems", Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).

  47. I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, "Performance analysis of distributed software systems: a sodel-driven approach", Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).

  48. S. Saad, I. Traore, "Ontology-based intelligent network forensics", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).

  49. A. Abdelhalim, I. Traore, "Unsupervised identity application fraud detection using rule-based decision tree", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).

  50. A. Abdelhalim and I. Traore, "A new method for learning decision trees from rules", In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA'09), Miami, Florida, USA, December 13-15, 2009.

  51. A. Abdelhalim, I. Traore, B. Sayed. "RBDT-1: a new rule-based decision tree generation technique", In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).

  52. A. Abdelhalim, I. Traore. "Converting declarative rules into decision trees", In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).

  53. O. Mohamed, I. Traore, "Cognitive-based biometrics system for static User authentication", in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice/Mestre, Italy.

  54. A. Hoole, I. Simplot-Ryl, I. Traore, "Integrating contract-based security monitors in the software development life cycle", in the Proceedings of 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008), Malta, November 27-28, 2008, (6 pages).

  55. O. Mohamed, I. Traore, "Cognitive-based biometrics system for static User authentication", in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice/Mestre, Italy.

  56. M. L. Yanguo, I. Traore, A.M. Hoole, "A service-oriented framework for quantitative security analysis of software architectures", in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.

  57. M. Hoole, I. Traore, "Contract-based security monitors for service-oriented software architecture", in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.

  58. A. Ahmed, I. Traore, A. Almulhem, "Digital fingerprinting based on keystroke dynamics", Proceedings of 2nd International Symposium on Human Aspects of Information Security and Assurance (HAISA), 8-9 July 2008, Plymouth, UK, (10 pages).

  59. Y.M. Liu, I. Traore, "Systematic security analysis for service-oriented software architectures", in the Proceedings of 3rd IEEE International Workshop on Service-Oriented System Engineering (SOSE07), to be held in Hong-Kong, China, on Oct. 24-26, 2007 (10 pages).

  60. A. Almulhem and I. Traore, "A survey of connection chains detection techniques", in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).

  61. A. Adelhalim and I. Traore, "Impact of google hacking on identity and application fraud", in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).

  62. Almulhem A. and I. Traore, "Mining and detecting connections chains in network traffic", in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds), (acceptance rate: 30%).

  63. A.M. Hoole and I. Traore, "A secure document management tool for scalable collaborative environments", in Proceedings of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, July 30, 2007, Moncton, New Brunswick, Canada, (12 pages), in conjunction with IFIPTM07.

  64. Y. Liu, I. Traore, "Complexity measures for secure service-oriented software architecture", to be published in the Proceedings of the 3rd IEEE International Predictor Models in Software Engineering (PROMISE) Workshop, May 20, 2007, Minneapolis, Minnesota, USA, in conjunction with 29th International Conference on Software Engineering (ICSE); (10 pages).

  65. D. Ghindici, G. Grimaud, I. Ryl, Y. Liu, I. Traore, "Integrated security verification and validation: case study", Proceedings of 2nd IEEE LCN Workshop on Network Security, Tampa, Florida, U.S.A., 14 November 2006.

  66. W. Lu, I. Traore, A novel evolutionary clustering algorithm based on Gaussian mixture model, Proceedings of the 10th WSEAS International Conference on COMPUTERS, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006 (acceptance rate: 47%).

  67. Liu, M.Y., and I. Traore, "Empirical relations between attackability and coupling: a case study on DoS", Proc. of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), P. 57-64, Ottawa, Canada, June 2006.

  68. Lu, W., I. Traore, "A novel unsupervised anomaly detection framework for detecting network attacks in real-time", 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, (acceptance rate: 23%, 28/118), Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmeddt et al. (Eds.).

  69. Lu, W., and I. Traore, "A new evolutionary algorithm for determining the optimal number of clusters", Proceedings of 2005 IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna, Austria, November 28-30 (acceptance rate: 38%).

  70. Lu, W., and I. Traore, "Determining the optimal number of clusters using a new evolutionary algorithm", 17th IEEE International Conference on Tools with Artificial Intelligence, Hong-Kong, pp. 712-713, November 14-16, 2005 (acceptance rate: 47%).

  71. Awad, A., and I. Traore, "Detecting computer intrusions using behavioral biometrics", 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, pp. 91-98, October 12-14, 2005 (acceptance rate: 36%, 18/50).

  72. Liu, M.Y., and I. Traore, "Measurement framework for software privilege protection based on user interaction analysis", 11th IEEE International Software Metrics Symposium, Como, Italy, September, 19-22, 2005. (acceptance rate: 40%).

  73. Lu, W., and I. Traore, "An unsupervised approach for detecting DDOS attacks based on traffic-based metrics", 10th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, Victoria, BC, Canada, pp. 462-465, August 24-26, 2005.

  74. Khan, S., and I. Traore, "A prevention model for algorithmic complexity attacks", Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (30% acc. rate), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.

  75. Ahmed, A.A.E., and I. Traore, "Anomaly intrusion detection based on biometrics", accepted for 6th IEEE Information Assurance Workshop, West Point, New York, USA, June 15-17 (acceptance rate 51%; 2 pages).

  76. S. Khan, I. Traore, "Queue-based analysis of DoS attacks", Proceedings of 6th IEEE Information Assurance Workshop, 15-17 June, West Point, New York, USA, Pages 266-273, (acceptance rate: 51%; 8 pages).

  77. Almulhem, A., and I. Traore, "Experience with engineering a network forensics system," International Conference on Information Networking (ICOIN2005), Jeju, Korea, January 2005, Lecture Notes in Computer Science (LNCS) Vol. 3391, pp. 62-71, Springer-Verlag 2005, Editor: C. Kim, (acc. rate: 24%, 102/427).

  78. M. Y. Liu, Issa Traore, "UML-based security measures of software products", International Workshop on Methodologies for Pervasive and Embedded Software (MOMPESВ’04), 4th International Conference on Application of Concurrency to System Design (ACSD-04), Hamilton, Ontario, Canada, June 2004.

  79. I. Traore, H. M. Al Jamal, Y. M. Liu, A.E.K. Sahraoui, "UML-PVS requirements specification and verification", 2004 International Symposium of the International Council on Systems Engineering (INCOSE-04), Toulouse, France, June 2004.

  80. I Traore, S. Khan, "A protection scheme for scalable collaborative environments", ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.

  81. I. Traore, "A transition-based strategy for object-oriented software testing", ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.

  82. M. Y. Liu, I. Traore, "PVS proof-patterns for UML-based verification", IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 8-11 2002, Lund, Sweden, pp 9-19.

  83. I. Traore, "An integrated V&V environment for critical systems development", 5th IEEE International Symposium on Requirements Engineering (REВ’01), 27-31 August 2001, Toronto, Canada, pp 287.

  84. I. Traore, "Automating the integration of heterogeneous software components", First ASERC Workshop on Software Architecture, 24-25 August 2001, Edmonton, Alberta, Canada.

  85. I. Traore, D.B. Aredo, "Integrating formal V&V and structured design reviews", Workshop on Inspections in Software Engineering (WISEВ’01), CAVВ’01 Conference, 23rd July 2001, Paris, France, pp 30-39.

  86. I. Traore, "A step towards rigorous integration of heterogeneous software components", International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2001), 25-28 June 2001, Las Vegas, Nevada, USA.

  87. I. Traore. "A framework for rigorous testing of object-oriented programs", IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 20th 2001, Washington D.C., USA, pp. 33-39.

  88. D.B. Aredo, I. Traore, K. Stolen, Oct. 6-8, 1999, "An outline of PVS semantics for UML class diagrams", 11th Nordic Workshop on Programming Theory (NWPT'99), O6-8 October, 1999, Uppsala, Sweden, pp. 49.

  89. I. Traore, D. B. Aredo, K. Stolen, September 1999, "Formal development of open distributed systems: towards an integrated framework", PLI'99 Conference, Workshop on Object-Oriented Specification Techniques for Distributed Systems and Behaviours (OOSDSВ’99), 27th September, Paris, France.

  90. I. Traore, A.E.K. Sahraoui, July 5-9, 1999, "The control kernel: a contribution to complex reactive systems modeling with VDM", 14th World Congress of IFAC, 5-9 July, 1999, Beijing, P.R. China, Vol. Q, pp. 245-250.

  91. I. Traore, A.E.K. Sahraoui, "Integrating formal methods in the development process of distributed systems: an approach with statemate and VDM", 15th IFAC Workshop on Distributed Computer Control Systems (DCCS'98), 9-11 September, 1998, Como, Italy, pp.65-70.

  92. I. Traore, A. Jeoffroy, M. Romdhani, A.E.K. Sahraoui, P. de Chazelles, "An experience with a multiformalism specification of an avionics system", 8th International Symposium of the International Council on Systems Engineering (INCOSE), Vancouver-Canada, 26-30 July, 1998, pp 723-730.

  93. I.Traore and A.E.K. Sahraoui, "A multiformalism specification framework with statecharts and VDM", 22nd IFAC/IFIP Workshop on Real-Time Programming (WRTPВ’97), Lyon, France, September 15-17, 1997, pp. 63-68.

  94. P.D. Zijderveld, I. Traore, R.A. Vingerhoeds, A.E.K. Sahraoui, "Timing specification and rule-based systems", IEEE/Euromicro Conference on Real-Time, Toledo-Spain, 11-13 June, 1997.

  95. I. Traore and A.E.K. Sahraoui, "Timing extensions in object analysis", IEEE/CESA'96 IMACS Multi-conference: Symposium on Discrete Events and Manufacturing Systems, Lille, France, July 9-12, 1996, pp. 358-363.

Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.