Asem Kitana, Issa Traore, Isaac Woungang, “Towards an Epidemic SMS-based Cellular Botnet”, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38–58, November 2020
Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. “Detecting Ransomware in Encrypted Web Traffic”. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.
Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham
Alenazi A., Traore I., Ganame K., Woungang I. (2017) Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham
S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.
S. Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015
S. Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.
Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., “In-Cloud Malware Analysis and Detection: State of the Art”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.
Alam, S.; Traore, I.; Sogukpinar, I., “Current Trends and the Future of Metamorphic Malware Detection”, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.
D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, “Botnet Detection based on Traffic Behavior Analysis and Flow Intervals”, Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.
David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. “Peer to Peer Botnet Detection Based on Flow Intervals”. Information Security and Privacy Research, IFIP Advances in Information and Communication Technology Volume 376, 2012, pp 87-102.
Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, “Detecting P2P botnets through network behavior analysis and machine learning“, Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).