- S. Saad, I. Traore, “Semantic-aware Attack Scenario Reconstruction”, Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67.
- S. Saad, I. Traore, “Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis“, Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.
- S. Saad, I. Traore, “Extracting Attack Scenarios Using Intrusion Semantics“, 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).
- S. Saad, I. Traore, “A Semantic-based Approach to Minimize IDS Alerts Flooding”, 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).
- S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. “High Performance Proactive Digital Forensics“. High Performance Computing Symposium (HPCS), Vancouver, 2012.
- S. Alharbi, J. Weber-Jahnke, I. Traore, “The proactive and reactive digital forensics investigation process: a systematic literature review”, Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15 – 17, 2011, Brno, Czech Republic.
- S. Alharbi, J. H. Weber-Jahnke, and I. Traore. “The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review“. International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.
- S. Saad, I. Traore, “A semantic analysis approach to manage IDS alerts flooding“, Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).
- S. Saad, I. Traore, “Method ontology for intelligent network forensics analysis“, Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).
- S. Saad, I. Traore, “Ontology-based intelligent network forensics“, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).
- A. Almulhem, I. Traore, “Detecting connection chains: a data mining approach”, to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.
- A. Almulhem, I. Traore, “Profiling distributed connection chains”, International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.
- A. Almulhem and I. Traore, “A survey of connection chains detection techniques”, in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).
- Almulhem A. and I. Traore, “Mining and detecting connections chains in network traffic”, in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds).
- A. Almulhem and Issa Traore, “Experience with engineering a network forensics system”, Lecture Notes in Computer Science, Springer-Verlag, 2005, (Proceedings of the International Conference on Information Networking (ICOIN2005), Jeju, Korea, Jan 2005).