ISOT research lab
  • Home
  • Research
    • Current projects
      • Threat detection and analysis using large graphs
      • Visualization aided anomaly detection 
      • Security and privacy for precision health
      • Secure predictive healthcare delivery through federated machine learning
      • Security and privacy for ageing in place
    • Past projects
      • Contract-based security assertion monitoring framework
      • Botnet detection
      • Intrusion characterization analysis toolkit
      • Behavioral biometrics
      • Rule based decision tree (RBDT)
      • Security testing & engineering using metrics
      • Spider
      • Whitenoise
      • Prude
      • Performance analyzer
      • Owner-retained access control
  • Publications
    • Complete list
      • Books
      • Book chapters
      • Guest editorials/tutorials
      • Conferences
      • Journals
      • Patents
      • Technical reports
    • By area
      • Electronic cash
      • Botnet/Malware detection
      • Intrusion Detection and Security Operation Centers (SOCs)
      • Content Security
      • IoT Security
      • Cloud Security
      • Model Based verification
      • Mobile Security
      • Network forensics
      • Owner-retained access control
      • Rule-based decision tree and application to identity fraud detection
      • Software performance engineering
      • Security for Precision Medicine
  • Datasets
    • Cloud Security Datasets
    • Behavioral Biometric Datasets
    • Botnet and Ransomware Detection Datasets
    • Fake News Detection Datasets
    • ISOT Mil-STD-1553 Dataset
  • People
  • Contact us
  • wyousef
Select Page
Journal & magazine links
  • American Scientist Online
  • Computer Communication Review
  • Elsevier Computer Science
  • Annual Computer Security Applications Conference
  • IEEE Computer Society
  • IEEE Security & Privacy Magazine
  • IEICE Trans Search System
  • International Journal of Digital Evidence
  • ScienceDirect – Computers & Security
  • ACM TISSEC (Transactions on Information & System Security)
Conference links
  • ACM CSC
  • ACM SIGKDD
  • ISOC (Internet SOCiety) Conferences
  • Annual Computer Security Applications Conference
  • UCL Crypto Group
  • New Security Paradigms Workshop
  • RAID Symposium
  • Advanced Computing Systems Association
Sponsored by
  • Plurilock Security Solutions Inc.
  • University of Victoria
  • Plantiga Technologies Inc.
  • Networks of Centres of Excellence
  • NSERC
  • BC Knowledge Development Fund
  • ALCATEL
  • CITR
  • Sunstone Circuits
  • Bell Canada
  • I. Traore, D.B. Aredo, “Enhancing structured review with model-based verification”, IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753, Nov. 2004.

  • I. Traore, H. M. Al Jamal, Y. M. Liu, A.E.K. Sahraoui, “UML-PVS requirements specification and verification”, 2004 International Symposium of the International Council on Systems Engineering (INCOSE-04), Toulouse, France, June 2004.

  • I. Traore, D. B. Aredo, H. Ye, “An integrated framework for formal development of open distributed systems”, Information and Software Technology, Elsevier Science, Vol. 46, No. 5, pp. 281-286, April 2004.

  • I. Traore, “A transition-based strategy for object-oriented software testing”, ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.

  • I. Traore, “An outline of PVS semantics for UML statecharts”, Journal of Universal Computer Science (JUCS), Springer Pub. Co., Vol. 6, No. 11, pp. 1088-1108, Nov. 2000.
footer-logo

The Information Security and Object Technology (ISOT) Research Group
Department of Electrical & Computer Engineering
University of Victoria
P.O. Box 3055
STN CSC ,Victoria BC, V8W 3P6,Canada

Resources

  • Contact UVic
  • Feedback
  • Legal notices
  • Updated info
  • Copyright info
  • Accessibility

  • UVic Home
  • ISOT Research Lab
  • Academic Calendar
  • Maps and buildings

Contact

(250) 721-8697
traore at ece.uvic.ca
© 2017 University of Victoria