- Asem Kitana, Issa Traore, Isaac Woungang, “Towards an Epidemic SMS-based Cellular Botnet”, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38–58, November 2020
- Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif Ahmed, “Multilayer Ransomware Detection using Grouped Registry Key Operations, File Entropy and File Signature Monitoring” Journal of Computer Security, Volume 28, Number 3, 2020, pages 337-373.
- Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. “Detecting Ransomware in Encrypted Web Traffic”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.
- Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham
- Alam, S.; Sogukpinar, I.; Traore, I; Horspool, N. R., “Sliding window of difference and control flow weight for metamorphic malware detection”, Journal of Computer Virology and Hacking Techniques, Springer, May 2015, Volume 11, Issue 2, pp 75–88.
- S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.
- S. Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015
- S. Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.
- Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., “In-Cloud Malware Analysis and Detection: State of the Art”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.
- Alam, S.; Traore, I.; Sogukpinar, I., “Current Trends and the Future of Metamorphic Malware Detection”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.
- D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, “Botnet Detection based on Traffic Behavior Analysis and Flow Intervals”, Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.
- D. Zhao, I. Traore, “P2P Botnet Detection through Malicious Fast Flux Network Identification“, 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing -3PGCIC 2012, November 12-14, 2012, Victoria, BC, Canada, (6 pages).
- Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, “Detecting P2P botnets through network behavior analysis and machine learning“, Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).