- W. A. Yousef, I. Traore and W. Briguglio, “Classifier Calibration: with application to threat scores in cybersecurity”, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3170011., April 2022
- Waleed Yousef, Issa Traore, William Briguglio, “UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring”, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 – 5210, 2021.
- C. Nie, P. G. Quinan, I. Traoré and I. Woungang, “Intrusion Detection using a Graphical Fingerprint Model,” 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109/CCGrid54584.2022.00095
- Paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, “Unsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events”, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, É., Boumerdassi, S., Mühlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117–130.
- Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., “Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative”. In: Boumerdassi S., Renault É., Mühlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham
- Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, “Automated Event Prioritization for Security Operation Center using Deep Learning”, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.
- Sherif Saad; Issa Traore; Marcelo Luiz Brocardo. “Context-aware intrusion alerts verification approach“, 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.
- W. Lu and I. Traore, “Unsupervised anomaly detection using an evolutionary extension of k-means algorithm”, International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.
- Khan, S., and I. Traore, “A prevention model for algorithmic complexity attacks”, Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.
- W. Lu, I. Traore, “A novel unsupervised anomaly detection framework for detecting network attacks in real-time”, 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmedt et al. (Eds.).