Skip to primary navigation.
Skip to secondary navigation.
Skip to page content.


Return to top of page.
Skip to secondary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Skip to secondary navigation.

Journals

  1. Abdulaziz Aldribi, Issa Traore, Belaid Moa, Onyekachi Nwamuo, “Hypervisor-Based Cloud Intrusion Detection through Online Multivariate Statistical Change Tracking”, Computers & Security, Elsevier, Volume 88, January 2020.

  2. Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed, “Multilayer Ransomware Detection using Grouped Registry Key Operations, File Entropy and File Signature Monitoring” Journal of Computer Security, Volume 28, Number 3, 2020, pages 337-373.

  3. Alhindi H., Traore I., and I. Woungang, “Preventing Data Leak through Semantic Analysis”, Journal of Internet of Things, Elsevier, 14 June 2019.

  4. Alshahrani M., Traore I., and I. Woungang, “Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique”, Journal of Internet of Things, Elsevier, Volume 7, September 2019.

  5. Alshahrani M., Traore I., “Secure Mutual Authentication and Automated Access Control for IoT Smart Home using Cumulative Keyed-hash chain”, Journal of Information Security and Applications, Elsevier, Volume 45, April 2019, Pages 156-175.

  6. Alshanketi F., Traore I., and A. Awad, “Multimodal Mobile Keystroke Dynamics Biometrics Combining Fixed and Variable passwords”, Journal of Security & Privacy, Wiley, Volume 2, Issue 1, January/February 2019.

  7. B. Sayed, I. Traore, A. Abdelhalim, “If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript”, Journal of Computers & Security, Elsevier, 75 (2018) 92–117.

  8. Traore I., M. Alshaharani, M. Obaidat, “State of the Art and Perspectives on Traditional and Emerging Biometrics: A Survey”, Journal of Security and Privacy, Wiley, Vol. 1 Issue 6, November/December 2018.

  9. Ahmed H, Traore I, Saad S., “Detecting opinion spams and fake news using text classification”, Security and Privacy, Wiley, Volume1, Issue1, January/February 2018.

  10. M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, “Authorship Verification Using Deep Belief Network Systems”, International Journal of Communication Systems, Wiley, Volume 30, Issue 12, August 2017.

  11. M. Brocardo, R. F. Custodio, C. R. De Rolt, J.D.S., and I. Traore, “Privacy Information in a Positive Credit System”, International Journal of Grid and Utility Computing, Vol.8 No.1, pp.61 - 69, February 2017.

  12. A. Kitana, I. Traore, I. Woungang, “Impact Study of a Mobile Botnet over LTE Networks”, Journal of Internet Services and Information Security, Vol. 6, No. 2, pages 1-22, May 2016.

  13. A. Abdelhalim and I. Traore, Y. Nakkabi, “Creating decision trees from rules using RBDT-1”, Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216–239, Wiley.

  14. Alam, S.; Sogukpinar, I.; Traore, I; Horspool, N. R., “Sliding window of difference and control flow weight for metamorphic malware detection”, Journal of Computer Virology and Hacking Techniques, Springer, May 2015, Volume 11, Issue 2, pp 75–88.

  15. S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.S.

  16. Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015.

  17. Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang. "Authorship verification of e-mail and tweet messages applied for continuous authentication", Journal of Computer and System Sciences, Available online 29 December 2014, ISSN 0022-0000.

  18. S. Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.

  19. I. Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, and I. Lai, “Online Risk-based Authentication using Behavioral Biometrics”, Journal of Multimedia Tools and Applications, Springer, July 2014, 71(2): 575-605.

  20. Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang. "Verifying Online User Identity using Stylometric Analysis for Short Messages", Journal of Networks 9, no. 12 (2014): 3347-3355.

  21. A.A.E, Ahmed, I. Traore, "Free Text Recognition of Keystrokes", IEEE Transactions on Cybernetics, Vol. 44 No. 4, April 2014, pp. 458-472 (14 pages).

  22. S. Saad, I. Traore, “Semantic-aware Attack Scenario Reconstruction”, Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67.

  23. D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, "Botnet Detection based on Traffic Behavior Analysis and Flow Intervals", Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.

  24. B. Sayed, I. Traore, I Woungang, M.S. Obaidat, "Static Authentication based on Mouse Gestures", IEEE Systems Journal, Vol. 7, No.2, June 2013, pages 262-274.

  25. I. Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, and B. Khalilian, "Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication", IEEE Transactions on Systems, Man, and Cybernetics Part B, Vol. 42 No. 5, October 2012, pages 1343-1356.

  26. S. Saad, I. Traore. "Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis", Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.

  27. S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. "High Performance Proactive Digital Forensics". High Performance Computing Symposium (HPCS), Vancouver, 2012.

  28. S. Alharbi, J. H. Weber-Jahnke, and I. Traore. "The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review". International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.

  29. O. Hamdy, I. Traore, "Homogenous physio-behavioral visual and mouse biometric", ACM Transactions on Computer Human Interactions, Volume 18 Issue 3, July 2011.

  30. I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, "A framework for bottleneck analysis in high-performance software design", Journal of Internet Technology (JIT), Vol. 13, No. 3, 2012.

  31. I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, "Software performance modeling using the UML: a case study", Journal of Networks (JNW), Academy Publisher, Vol. 7, No. 1, January 2012.

  32. A. Hoole, I. Traore, I. Simplot-Ryl, "Application of contract-based security assertion monitoring framework for telecommunications software engineering", Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.

  33. Y. Nakkabi, , I. Traore, A. A. E Ahmed, "Improving mouse dynamics biometric performance using variance reduction with separate extractors", IEEE Transactions on Systems, Man and Cybernetics”Part A: Systems and Humans, Vol. 40, No. 6, November 2010; pages 1345“ 1353.

  34. A. Almulhem, I. Traore, "Detecting connection chains: a data mining approach", International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.

  35. A. Abdelhalim, I. Traore, "Identity application fraud detection using web mining and rule-based decision tree", International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.

  36. I. Simplot-Ryl, I. Traore, P. Everaere, "Distributed architectures for electronic cash schemes: a survey", International Journal of Parallel, Emergent and Distributed Systems, accepted for publication in September 2008, (28 pages).

  37. A. Almulhem, I. Traore, "Detecting connection chains: a data mining approach", to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.

  38. A. Nazar, I. Traore, A.A.E. Ahmed, "Inverse biometrics for mouse dynamics", International Journal of Artificial Intelligence and Pattern Recognition (IJPRAI), Volume 22, Issue 3, May 2008, pp. 461-495, (35 pages).

  39. W. Lu and I. Traore, "Unsupervised anomaly detection using an evolutionary extension of k-means algorithm", International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.

  40. Almulhem A. and I. Traore, "Profiling distributed connection chains", International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.

  41. Ahmed A.A.E , and I. Traore "A new biometrics technology based on mouse dynamics", IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, July-September 2007, pp. 165-179, (15 pages).

  42. M.Y. Liu, I. Traore, "Properties for security measures of software products", Applied Mathematics & Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.

  43. W. Lu, I. Traore, "A genetic EM algorithm for learning the optimal number of components of mixture models", WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).

  44. Traore, D.B. Aredo, "Enhancing structured review with model-based verification", IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753.

  45. Wei Lu, Issa Traore, "Detecting new forms of network intrusions using genetic programming", Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA & Oxford UK.

  46. I. Traore, D. B. Aredo, H. Ye, "An integrated framework for formal development of open distributed systems", Information and Software Technology, Elsevier Science, Vol. 46, No. 5, pp. 281-286, April 2004.

  47. I. Traore, "An outline of PVS semantics for UML statecharts", Journal of Universal Computer Science (JUCS), Springer Pub. Co., Vol. 6, No. 11, pp. 1088-1108, Nov. 2000.

  48. M. Romdhani, A. Jeoffroy, A.E.K. Sahraoui, I. Traore, "Integration of partial specification for airborne embedded systems", European Journal of Automation, Vol. 31, No. 7, pp. 1221-1251, Nov. 1997.

Return to top of page.
Return to primary navigation.
Skip to page content.
Return to top of page.
Return to primary navigation.
Return to secondary navigation.
Return to page content.