Wireless Security

W Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, “Admission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System”, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109/JSYST.2022.3207019ireless...

Software performance engineering

I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, "A framework for dottleneck analysis in high-performance software design", Journal of Internet Technology (JIT), (accepted May 19, 2011; under press; 21 pages).   I. Traore, I. Woungang, A.A.E. Hamed, M.S....

Rule-based decision tree and application to identity fraud detection

A. Abdelhalim and I. Traore, Y. Nakkabi, "Creating decision trees from rules using RBDT-1", Computational Intelligence, Volume 32, Issue 2, May 2016, Pages 216–239, Wiley. A. Abdelhalim and I. Traore, 8. Abdelhalim A., Traore I. (2010) RBDT-1 Method: Combining Rules...

Owner-retained access control

  A.M. Hoole and I. Traore, "A secure document management tool for scalable collaborative environments", Proceedings of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, July 30, 2007, Moncton, New Brunswick, Canada, (12...

Network forensics

S. Saad, I. Traore, "Semantic-aware Attack Scenario Reconstruction", Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67. S. Saad, I. Traore, "Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic...

Model Based verification

I. Traore, D.B. Aredo, "Enhancing structured review with model-based verification", IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753, Nov. 2004. I. Traore, H. M. Al Jamal, Y. M. Liu, A.E.K. Sahraoui, "UML-PVS requirements specification and...

Mobile Security

S. Hari Shankar, I. Woungang, S. K. Dhurandher, I. Traore, S.B. Kaleel, “E-MAntNet: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks”, 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015), Gwangju,...

IoT Security

Moneer Fakroon, Mohammed Alshahrani, Fayez Gebali, Issa Traore, “Secure remote anonymous user authentication scheme for smart home environment”, Journal of Internet of Things, Elsevier, Volume 9, March 2020.   Mohammed Alshahrani, Issa Traore, and Sherif Saad....

Intrusion Detection and Security Operation Centers (SOCs)

W. A. Yousef, I. Traore and W. Briguglio, "Classifier Calibration: with application to threat scores in cybersecurity”, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2022.3170011., April 2022 Waleed Yousef, Issa Traore, William Briguglio,...

Electronic cash

M. Brocardo, R.F. Custodio, C.R. De Rolt, J.D.S. Dias, Julio Da Silva, and I. Traore, “Sharing Privacy Information in Credit Analysis Environment”, 9th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), 2015, Florianopolis, Santa...

Content Security

Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, “Automated detection of unstructured context-dependent sensitive information using deep learning”, Journal of Internet of Things, Elsevier, Volume 16, December 2021. Hanan Alhindi, Issa Traore, and Isaac...

Cloud Security

Abdulaziz Aldribi, Issa Traore, Belaid Moa, Onyekachi Nwamuo, “Hypervisor-Based Cloud Intrusion Detection through Online Multivariate Statistical Change Tracking”, Computers & Security, Elsevier, Volume 88, January 2020. Asem Ghaleb, Issa Traore, Karim Ganame, “A...

Botnet/Malware detection

Asem Kitana, Issa Traore, Isaac Woungang, “Towards an Epidemic SMS-based Cellular Botnet”, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38–58, November 2020 Brijesh Jethva, Issa Traoré, Asem Ghaleb, Karim Ganame, Sherif...

Software security

B. Sayed, I. Traore, A. Abdelhalim, “If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript”, Journal of Computers & Security, Elsevier, 75 (2018) 92–117. A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, "Improving Vulnerabilities...

Biometrics Technologies

S. Saad, I. Traore, "Semantic-aware Attack Scenario Reconstruction", Journal of Information Security and Applications, Elsevier, Volume 18, Issue 1, July 2013, Pages 53–67. S. Saad, I. Traore, "Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic...

Security for Precision Medicine

William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traoré, Mohammad Mamun, “Machine Learning in Precision Medicine to Preserve Privacy via Encryption”, Pattern Recognition Letters, Elsevier, Volume 151, November 2021, Pages 148-154. Moghaddam Parisa, Iqbal...