• Asem Kitana, Issa Traore, Isaac Woungang, “Towards an Epidemic SMS-based Cellular Botnet”, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38–58, November 2020

  • Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. “Detecting Ransomware in Encrypted Web Traffic”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.

  • Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham

  • S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.

  • S. Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015

  • S. Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.

  • Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., “In-Cloud Malware Analysis and Detection: State of the Art”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.

  • Alam, S.; Traore, I.; Sogukpinar, I., “Current Trends and the Future of Metamorphic Malware Detection”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.

  • D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, “Botnet Detection based on Traffic Behavior Analysis and Flow Intervals”, Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.