ISOT research lab
  • Home
  • Research
    • Current projects
      • Threat detection and analysis using large graphs
      • Visualization aided anomaly detection 
      • Security and privacy for precision health
      • Secure predictive healthcare delivery through federated machine learning
      • Security and privacy for ageing in place
    • Past projects
      • Contract-based security assertion monitoring framework
      • Botnet detection
      • Intrusion characterization analysis toolkit
      • Behavioral biometrics
      • Rule based decision tree (RBDT)
      • Security testing & engineering using metrics
      • Spider
      • Whitenoise
      • Prude
      • Performance analyzer
      • Owner-retained access control
  • Publications
    • Complete list
      • Books
      • Book chapters
      • Guest editorials/tutorials
      • Conferences
      • Journals
      • Patents
      • Technical reports
    • By area
      • Electronic cash
      • Botnet/Malware detection
      • Intrusion Detection and Security Operation Centers (SOCs)
      • Content Security
      • IoT Security
      • Cloud Security
      • Model Based verification
      • Mobile Security
      • Network forensics
      • Owner-retained access control
      • Rule-based decision tree and application to identity fraud detection
      • Software performance engineering
      • Security for Precision Medicine
  • Datasets
    • Cloud Security Datasets
    • Behavioral Biometric Datasets
    • Botnet and Ransomware Detection Datasets
    • Fake News Detection Datasets
    • ISOT Mil-STD-1553 Dataset
  • People
  • Contact us
  • wyousef
Select Page
Journal & magazine links
  • American Scientist Online
  • Computer Communication Review
  • Elsevier Computer Science
  • Annual Computer Security Applications Conference
  • IEEE Computer Society
  • IEEE Security & Privacy Magazine
  • IEICE Trans Search System
  • International Journal of Digital Evidence
  • ScienceDirect – Computers & Security
  • ACM TISSEC (Transactions on Information & System Security)
Conference links
  • ACM CSC
  • ACM SIGKDD
  • ISOC (Internet SOCiety) Conferences
  • Annual Computer Security Applications Conference
  • UCL Crypto Group
  • New Security Paradigms Workshop
  • RAID Symposium
  • Advanced Computing Systems Association
Sponsored by
  • Plurilock Security Solutions Inc.
  • University of Victoria
  • Plantiga Technologies Inc.
  • Networks of Centres of Excellence
  • NSERC
  • BC Knowledge Development Fund
  • ALCATEL
  • CITR
  • Sunstone Circuits
  • Bell Canada

 

  • A.M. Hoole and I. Traore, “A secure document management tool for scalable collaborative environments”, Proceedings of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, July 30, 2007, Moncton, New Brunswick, Canada, (12 pages), in conjunction with IFIPTM07.

  • I Traore, S. Khan, “A protection scheme for scalable collaborative environments”, ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.
footer-logo

The Information Security and Object Technology (ISOT) Research Group
Department of Electrical & Computer Engineering
University of Victoria
P.O. Box 3055
STN CSC ,Victoria BC, V8W 3P6,Canada

Resources

  • Contact UVic
  • Feedback
  • Legal notices
  • Updated info
  • Copyright info
  • Accessibility

  • UVic Home
  • ISOT Research Lab
  • Academic Calendar
  • Maps and buildings

Contact

(250) 721-8697
traore at ece.uvic.ca
© 2017 University of Victoria