W. A. Yousef, I. Traore and W. Briguglio, “Classifier Calibration: with application to threat scores in cybersecurity”, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3170011., April 2022
Waleed Yousef, Issa Traore, William Briguglio, “UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring”, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 – 5210, 2021.
C. Nie, P. G. Quinan, I. Traoré and I. Woungang, “Intrusion Detection using a Graphical Fingerprint Model,” 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109/CCGrid54584.2022.00095
Paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, “Unsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events”, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, É., Boumerdassi, S., Mühlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117–130.
Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., “Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative”. In: Boumerdassi S., Renault É., Mühlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham
Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, “Automated Event Prioritization for Security Operation Center using Deep Learning”, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.
Sherif Saad; Issa Traore; Marcelo Luiz Brocardo. “Context-aware intrusion alerts verification approach“, 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.
S. Khan and I. Traore, “Queue based analysis of DoS attacks”, Proceedings of the sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2005, pp. 266-273.
Khan, S., and I. Traore, “A prevention model for algorithmic complexity attacks”, Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.