• Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, “Admission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System”, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109/JSYST.2022.3207019

  • W. A. Yousef, I. Traore and W. Briguglio, “Classifier Calibration: with application to threat scores in cybersecurity”, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3170011., April 2022.

  • Waleed Yousef, Issa Traore, William Briguglio, “UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring”, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 – 5210, 2021.

  • William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun, “Machine Learning in Precision Medicine to Preserve Privacy via Encryption”, Pattern Recognition Letters, Elsevier, Volume 151, November 2021, Pages 148-154.

  • Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, “Automated detection of unstructured context-dependent sensitive information using deep learning”, Journal of Internet of Things, Elsevier, Volume 16, December 2021.

  • Hanan Alhindi, Issa Traore, and Isaac Woungang, “Preventing Data Loss by Harnessing Semantic Similarity and Relevance”, Journal of Internet Services and Information Security (JISIS), volume: 11, number: 2 (May 2021), pp. 78-99.

  • Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, “Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure”, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.

  • Asem Kitana, Issa Traore, Isaac Woungang, “Towards an Epidemic SMS-based Cellular Botnet”, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38–58, November 2020.

  • Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, “When Agile Security Meets 5G”, IEEE Access, Volume 8, pages 166212 – 166225, September 2020

  • Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, “Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks”, IEEE Systems Journal, July 2020, pages 1-12.

  • Moneer Fakroon, Mohammed Alshahrani, Fayez Gebali, Issa Traore, “Secure remote anonymous user authentication scheme for smart home environment”, Journal of Internet of Things, Elsevier, Volume 9, March 2020, (citations: 7).

  • Brocardo, R. F. Custodio, C. R. De Rolt, J.D.S., and I. Traore, “Privacy Information in a Positive Credit System”, International Journal of Grid and Utility Computing, Vol.8 No.1, pp.61 – 69, February 2017.

  • Abdelhalim and I. Traore, Y. Nakkabi, “Creating decision trees from rules using RBDT-1”, Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216–239, Wiley.

  • Alam, R. N. Horspool, I. Traore, I. Sogukpinar, “A framework for metamorphic malware analysis and real-time detection”, Computers & Security, Volume 48, February 2015, Pages 212–233.S.

  • Alam, I. Traore, İ. Soğukpınar, “Annotated Control Flow Graph for Metamorphic Malware Detection”. The Computer Journal, Oxford Press, Volume 58 Issue 10 October 2015.

  • Moein, F. Gebali, I. Traore, “Analysis of Covert Hardware Attacks”, Journal of Convergence, Volume 5, Number 3, pp. 26-30, September 2014.

  • A.E, Ahmed, I. Traore, “Free Text Recognition of Keystrokes”, IEEE Transactions on Cybernetics, Vol. 44 No. 4, April 2014, pp. 458-472 (14 pages).

  • Saad, I. Traore, “Semantic-aware Attack Scenario Reconstruction”, Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67.

  • Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, “Botnet Detection based on Traffic Behavior Analysis and Flow Intervals”, Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.

  • Sayed, I. Traore, I Woungang, M.S. Obaidat, “Static Authentication based on Mouse Gestures”, IEEE Systems Journal, Vol. 7, No.2, June 2013, pages 262-274.

  • Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, and B. Khalilian, “Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication”, IEEE Transactions on Systems, Man, and Cybernetics Part B, Vol. 42 No. 5, October 2012, pages 1343-1356.

  • Saad, I. Traore. “Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis”, Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.

  • Hamdy, I. Traore, “Homogenous physio-behavioral visual and mouse biometric”, ACM Transactions on Computer Human Interactions, Volume 18 Issue 3, July 2011.

  • Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, “A framework for bottleneck analysis in high-performance software design”, Journal of Internet Technology (JIT), Vol. 13, No. 3, 2012.

  • Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, “Software performance modeling using the UML: a case study”, Journal of Networks (JNW), Academy Publisher, Vol. 7, No. 1, January 2012.

  • Hoole, I. Traore, I. Simplot-Ryl, “Application of contract-based security assertion monitoring framework for telecommunications software engineering”, Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.

  • Nakkabi, , I. Traore, A. A. E Ahmed, “Improving mouse dynamics biometric performance using variance reduction with separate extractors”, IEEE Transactions on Systems, Man and Cybernetics”Part A: Systems and Humans, Vol. 40, No. 6, November 2010; pages 1345“ 1353.

  • Almulhem, I. Traore, “Detecting connection chains: a data mining approach”, International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.

  • Abdelhalim, I. Traore, “Identity application fraud detection using web mining and rule-based decision tree”, International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.

  • Simplot-Ryl, I. Traore, P. Everaere, “Distributed architectures for electronic cash schemes: a survey”, International Journal of Parallel, Emergent and Distributed Systems, accepted for publication in September 2008, (28 pages).

  • Almulhem, I. Traore, “Detecting connection chains: a data mining approach”, to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.

  • Nazar, I. Traore, A.A.E. Ahmed, “Inverse biometrics for mouse dynamics”, International Journal of Artificial Intelligence and Pattern Recognition (IJPRAI), Volume 22, Issue 3, May 2008, pp. 461-495, (35 pages).

  • Lu and I. Traore, “Unsupervised anomaly detection using an evolutionary extension of k-means algorithm”, International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.

  • Almulhem A. and I. Traore, “Profiling distributed connection chains”, International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.

  • Ahmed A.A.E , and I. Traore “A new biometrics technology based on mouse dynamics”, IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, July-September 2007, pp. 165-179, (15 pages).

  • Y. Liu, I. Traore, “Properties for security measures of software products”, Applied Mathematics & Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.

  • Lu, I. Traore, “A genetic EM algorithm for learning the optimal number of components of mixture models”, WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).

  • Traore, D.B. Aredo, “Enhancing structured review with model-based verification”, IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753.

  • Wei Lu, Issa Traore, “Detecting new forms of network intrusions using genetic programming”, Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA & Oxford UK.

  • Traore, D. B. Aredo, H. Ye, “An integrated framework for formal development of open distributed systems”, Information and Software Technology, Elsevier Science, Vol. 46, No. 5, pp. 281-286, April 2004.

  • Traore, “An outline of PVS semantics for UML statecharts”, Journal of Universal Computer Science (JUCS), Springer Pub. Co., Vol. 6, No. 11, pp. 1088-1108, Nov. 2000.

  • Romdhani, A. Jeoffroy, A.E.K. Sahraoui, I. Traore, “Integration of partial specification for airborne embedded systems”, European Journal of Automation, Vol. 31, No. 7, pp. 1221-1251, Nov. 1997.

 

  •