ISOT research lab
  • Home
  • Research
    • Current projects
      • Threat detection and analysis using large graphs
      • Visualization aided anomaly detection 
      • Security and privacy for precision health
      • Secure predictive healthcare delivery through federated machine learning
      • Security and privacy for ageing in place
    • Past projects
      • Contract-based security assertion monitoring framework
      • Botnet detection
      • Intrusion characterization analysis toolkit
      • Behavioral biometrics
      • Rule based decision tree (RBDT)
      • Security testing & engineering using metrics
      • Spider
      • Whitenoise
      • Prude
      • Performance analyzer
      • Owner-retained access control
  • Publications
    • Complete list
      • Books
      • Book chapters
      • Guest editorials/tutorials
      • Conferences
      • Journals
      • Patents
      • Technical reports
    • By area
      • Electronic cash
      • Botnet/Malware detection
      • Intrusion Detection and Security Operation Centers (SOCs)
      • Content Security
      • IoT Security
      • Cloud Security
      • Model Based verification
      • Mobile Security
      • Network forensics
      • Owner-retained access control
      • Rule-based decision tree and application to identity fraud detection
      • Software performance engineering
      • Security for Precision Medicine
  • Datasets
    • Drone Datasets
    • Cloud Security Datasets
    • Behavioral Biometric Datasets
    • Botnet and Ransomware Detection Datasets
    • Fake News Detection Datasets
    • ISOT Mil-STD-1553 Dataset
  • People
  • Contact us
  • wyousef
Select Page
Journal & magazine links
  • American Scientist Online
  • Computer Communication Review
  • Elsevier Computer Science
  • Annual Computer Security Applications Conference
  • IEEE Computer Society
  • IEEE Security & Privacy Magazine
  • IEICE Trans Search System
  • International Journal of Digital Evidence
  • ScienceDirect – Computers & Security
  • ACM TISSEC (Transactions on Information & System Security)
Conference links
  • ACM CSC
  • ACM SIGKDD
  • ISOC (Internet SOCiety) Conferences
  • Annual Computer Security Applications Conference
  • UCL Crypto Group
  • New Security Paradigms Workshop
  • RAID Symposium
  • Advanced Computing Systems Association
Sponsored by
  • Plurilock Security Solutions Inc.
  • University of Victoria
  • Plantiga Technologies Inc.
  • Networks of Centres of Excellence
  • NSERC
  • BC Knowledge Development Fund
  • ALCATEL
  • CITR
  • Sunstone Circuits
  • Bell Canada
  • I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, “A framework for dottleneck analysis in high-performance software design”, Journal of Internet Technology (JIT), (accepted May 19, 2011; under press; 21 pages).

 

  • I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, “Software performance modeling using the UML: a case study”, Journal of Networks (JNW), Academy Publisher, (accepted March 2011; under press; 22 pages).

 

  • I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, “UML-based performance modeling of distributed software systems”, Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).

 

  • I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, “Performance analysis of distributed software systems: a model-driven approach”, Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).
footer-logo

The Information Security and Object Technology (ISOT) Research Group
Department of Electrical & Computer Engineering
University of Victoria
P.O. Box 3055
STN CSC ,Victoria BC, V8W 3P6,Canada

Resources

  • Contact UVic
  • Feedback
  • Legal notices
  • Updated info
  • Copyright info
  • Accessibility

  • UVic Home
  • ISOT Research Lab
  • Academic Calendar
  • Maps and buildings

Contact

(250) 721-8697
traore at ece.uvic.ca
© 2017 University of Victoria