• S. Saad, I. Traore, “Semantic-aware Attack Scenario Reconstruction”, Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67.

  • S. Saad, I. Traore, “A Semantic-based Approach to Minimize IDS Alerts Flooding”, 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).

  • S. Alharbi, J. Weber-Jahnke, I. Traore, “The proactive and reactive digital forensics investigation process: a systematic literature review”, Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15 – 17, 2011, Brno, Czech Republic.

  • S. Saad, I. Traore, “Ontology-based intelligent network forensics“, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).

  • Almulhem A. and I. Traore, “Mining and detecting connections chains in network traffic”, in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds).