ISOT research lab
  • Home
  • Research
    • Current projects
      • Threat detection and analysis using large graphs
      • Visualization aided anomaly detection 
      • Security and privacy for precision health
      • Secure predictive healthcare delivery through federated machine learning
      • Security and privacy for ageing in place
    • Past projects
      • Contract-based security assertion monitoring framework
      • Botnet detection
      • Intrusion characterization analysis toolkit
      • Behavioral biometrics
      • Rule based decision tree (RBDT)
      • Security testing & engineering using metrics
      • Spider
      • Whitenoise
      • Prude
      • Performance analyzer
      • Owner-retained access control
  • Publications
    • Complete list
      • Books
      • Book chapters
      • Guest editorials/tutorials
      • Conferences
      • Journals
      • Patents
      • Technical reports
    • By area
      • Electronic cash
      • Botnet/Malware detection
      • Intrusion Detection and Security Operation Centers (SOCs)
      • Content Security
      • IoT Security
      • Cloud Security
      • Model Based verification
      • Mobile Security
      • Network forensics
      • Owner-retained access control
      • Rule-based decision tree and application to identity fraud detection
      • Software performance engineering
      • Security for Precision Medicine
  • Datasets
    • Cloud Security Datasets
    • Behavioral Biometric Datasets
    • Botnet and Ransomware Detection Datasets
    • Fake News Detection Datasets
    • ISOT Mil-STD-1553 Dataset
  • People
  • Contact us
  • wyousef
Select Page
Journal & magazine links
  • American Scientist Online
  • Computer Communication Review
  • Elsevier Computer Science
  • Annual Computer Security Applications Conference
  • IEEE Computer Society
  • IEEE Security & Privacy Magazine
  • IEICE Trans Search System
  • International Journal of Digital Evidence
  • ScienceDirect – Computers & Security
  • ACM TISSEC (Transactions on Information & System Security)
Conference links
  • ACM CSC
  • ACM SIGKDD
  • ISOC (Internet SOCiety) Conferences
  • Annual Computer Security Applications Conference
  • UCL Crypto Group
  • New Security Paradigms Workshop
  • RAID Symposium
  • Advanced Computing Systems Association
Sponsored by
  • Plurilock Security Solutions Inc.
  • University of Victoria
  • Plantiga Technologies Inc.
  • Networks of Centres of Excellence
  • NSERC
  • BC Knowledge Development Fund
  • ALCATEL
  • CITR
  • Sunstone Circuits
  • Bell Canada

  • A. Abdelhalim and I. Traore, Y. Nakkabi, “Creating decision trees from rules using RBDT-1“, Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216–239, Wiley.

  • A. Abdelhalim and I. Traore, 8. Abdelhalim A., Traore I. (2010) RBDT-1 Method: Combining Rules and Decision Tree Capabilities. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems Engineering. Lecture Notes in Electrical Engineering, vol 68. Springer, Dordrecht.

  • A. Abdelhalim, I. Traore, “Unsupervised identity application fraud detection using rule-based decision tree“, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).

  • A. Abdelahlim, I. Traore, “Identity application fraud detection using web mining and rule-based decision tree“, International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.

  • A. Abdelhalim and I. Traore, “A new method for learning decision trees from rules“, In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA’09), Miami, Florida, USA, December 13-15, 2009.

  • A. Abdelhalim, I. Traore, B. Sayed, “RBDT-1: a new rule-based decision tree generation technique“, In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).

  • A. Abdelhalim, I. Traore, “Converting declarative rules into decision trees“, In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).
footer-logo

The Information Security and Object Technology (ISOT) Research Group
Department of Electrical & Computer Engineering
University of Victoria
P.O. Box 3055
STN CSC ,Victoria BC, V8W 3P6,Canada

Resources

  • Contact UVic
  • Feedback
  • Legal notices
  • Updated info
  • Copyright info
  • Accessibility

  • UVic Home
  • ISOT Research Lab
  • Academic Calendar
  • Maps and buildings

Contact

(250) 721-8697
traore at ece.uvic.ca
© 2017 University of Victoria