{"id":12,"date":"2018-04-18T20:51:01","date_gmt":"2018-04-18T20:51:01","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/myportfolio\/?page_id=12"},"modified":"2022-12-12T00:00:19","modified_gmt":"2022-12-12T00:00:19","slug":"research","status":"publish","type":"page","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.18.0&#8243; background_image=&#8221;https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/1ed4a6048c6e3f179533209284dbdb2e_How-to-Get-Computer-Help.jpg&#8221; parallax=&#8221;on&#8221; background_blend=&#8221;color-dodge&#8221; custom_padding=&#8221;0px|0|0px|0px|false|false&#8221; bottom_divider_style=&#8221;waves&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Research &#8221; text_orientation=&#8221;center&#8221; admin_label=&#8221;Fullwidth Header&#8221; _builder_version=&#8221;4.18.0&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_align=&#8221;center&#8221; title_font_size=&#8221;80px&#8221; title_line_height=&#8221;1.2em&#8221; content_font=&#8221;Open Sans||||||||&#8221; content_text_align=&#8221;center&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_stops=&#8221;rgba(0,72,114,0.9) 0%|rgba(41,17,96,0.8) 100%&#8221; background_color_gradient_start=&#8221;rgba(0,72,114,0.9)&#8221; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;on&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;15px&#8221; button_one_bg_color=&#8221;#ffa727&#8243; button_one_border_width=&#8221;15px&#8221; button_one_border_color=&#8221;#ffa727&#8243; button_one_border_radius=&#8221;100px&#8221; button_one_letter_spacing=&#8221;5px&#8221; button_one_font=&#8221;Open Sans|700||on|||||&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;4vw||4vw||true|&#8221; custom_padding_tablet=&#8221;100px||100px||true&#8221; custom_padding_phone=&#8221;|||&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; title_font_size_tablet=&#8221;60px&#8221; title_font_size_phone=&#8221;36px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;16px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; button_one_text_size_tablet=&#8221;&#8221; button_one_text_size_phone=&#8221;&#8221; button_one_text_size_last_edited=&#8221;on|desktop&#8221; button_one_border_color_hover=&#8221;#ff8a3d&#8221; button_one_border_radius_hover=&#8221;100px&#8221; button_one_letter_spacing_hover=&#8221;5px&#8221; button_one_bg_color_hover=&#8221;#ff8a3d&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;on&#8221; button_one_border_color__hover=&#8221;#ff8a3d&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;on&#8221; button_one_border_radius__hover=&#8221;100px&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;5px&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;on&#8221; button_one_bg_color__hover=&#8221;#ff8a3d&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#000000&#8243; header_5_font_size=&#8221;17px&#8221; header_5_line_height=&#8221;1.5em&#8221; inline_fonts=&#8221;ABeeZee&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-size: medium\">The main research thread pursued in the ISOT Lab lies in the rigorous development of secure and dependable computing systems and in the protection of these systems. Our recent and current research activities include the following:<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">Development of innovative behavioral biometrics technologies and their application for continuous user authentication.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Development of proactive techniques for intrusion detection based on Artificial Intelligence and statistical techniques.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Development of intelligent approaches for automating computer and network forensics investigation processes.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Development of an integrated framework for rigorous validation and verification of critical software systems that covers various stages of software lifecycle.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Development of rigorous methods for software security monitoring, testing, and measurement.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"column_attr mfn-inline-editor clearfix\" style=\"padding: 0 0 0 10%;border-left: 1px solid #e6e6e6\">\n<p><strong>Learn more about<\/strong><\/p>\n<ul>\n<li><strong><a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/research\/current-projects\/\" data-wplink-url-error=\"true\">Current Projects<\/a><\/strong><\/li>\n<li><strong>\u00a0<a href=\"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/research\/past-projects\/\" target=\"_blank\" rel=\"noopener\" data-wplink-url-error=\"true\">Past Pojects<\/a><\/strong><\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_accordion _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;Journal &amp; magazine links&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; toggle_font=&#8221;|600|||||||&#8221; body_font=&#8221;|600|||||||&#8221; body_text_color=&#8221;#000000&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.americanscientist.org\" target=\"_blank\" rel=\"noopener\">American Scientist Online<\/a><\/li>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigcomm\" target=\"_blank\" rel=\"noopener\">Computer Communication Review<\/a><\/li>\n<li><a href=\"http:\/\/www.elsevier.com\/computerscience\" target=\"_blank\" rel=\"noopener\">Elsevier Computer Science<\/a><\/li>\n<li><a href=\"http:\/\/www.acsac.org\" target=\"_blank\" rel=\"noopener\">Annual Computer Security Applications Conference<\/a><\/li>\n<li><a href=\"http:\/\/www.computer.org\/?SMIDENTITY=NO\" target=\"_blank\" rel=\"noopener\">IEEE Computer Society<\/a><\/li>\n<li><a href=\"http:\/\/www.computer.org\/security\" target=\"_blank\" rel=\"noopener\">IEEE Security &amp; Privacy Magazine<\/a><\/li>\n<li><a href=\"http:\/\/search.ieice.or.jp\" target=\"_blank\" rel=\"noopener\">IEICE Trans Search System<\/a><\/li>\n<li><a href=\"http:\/\/www.ijde.org\" target=\"_blank\" rel=\"noopener\">International Journal of Digital Evidence<\/a><\/li>\n<li><a href=\"http:\/\/www.sciencedirect.com\/science?_ob=JournalURL&amp;_cdi=5870&amp;_auth=y&amp;_acct=C000050221&amp;_version=1&amp;_urlVersion=0&amp;_userid=10&amp;md5=8ce696f1b637fd75b38ee274c7180a97\" target=\"_blank\" rel=\"noopener\">ScienceDirect &#8211; Computers &amp; Security<\/a><\/li>\n<li><a href=\"http:\/\/portal.acm.org\/browse_dl.cfm?linked=1&amp;part=transaction&amp;idx=J789&amp;coll=ACM&amp;dl=ACM&amp;CFID=16003108&amp;CFTOKEN=80580950\" target=\"_blank\" rel=\"noopener\">ACM TISSEC (Transactions on Information &amp; System Security)<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Conference links&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; toggle_font=&#8221;|600|||||||&#8221; body_font=&#8221;|600|||||||&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigsac\/ccs\/\" target=\"_blank\" rel=\"noopener\">ACM CSC<\/a><\/li>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigkdd\/\" target=\"_blank\" rel=\"noopener\">ACM SIGKDD<\/a><\/li>\n<li><a href=\"http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/\" target=\"_blank\" rel=\"noopener\">ISOC (Internet SOCiety) Conferences<\/a><\/li>\n<li><a href=\"http:\/\/www.acsac.org\/\" target=\"_blank\" rel=\"noopener\">Annual Computer Security Applications Conference<\/a><\/li>\n<li><a href=\"http:\/\/www.dice.ucl.ac.be\/crypto\" target=\"_blank\" rel=\"noopener\">UCL Crypto Group<\/a><\/li>\n<li><a href=\"http:\/\/www.nspw.org\/current\/\" target=\"_blank\" rel=\"noopener\">New Security Paradigms Workshop<\/a><\/li>\n<li><a href=\"http:\/\/www.raid-symposium.org\/\" target=\"_blank\" rel=\"noopener\">RAID Symposium<\/a><\/li>\n<li><a href=\"http:\/\/www.usenix.org\/\" target=\"_blank\" rel=\"noopener\">Advanced Computing Systems Association<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Sponsored by&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221; toggle_font=&#8221;|600|||||||&#8221; body_font=&#8221;|600|||||||&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.plurilock.com\/\" target=\"_blank\" rel=\"noopener\">Plurilock Security Solutions Inc.<\/a><\/li>\n<li><a href=\"https:\/\/www.uvic.ca\/\" target=\"_blank\" rel=\"noopener\">University of Victoria<\/a><\/li>\n<li><a href=\"http:\/\/www.plantiga.com\/\" target=\"_blank\" rel=\"noopener\">Plantiga Technologies Inc.<\/a><\/li>\n<li><a href=\"http:\/\/www.nce.gc.ca\/\" target=\"_blank\" rel=\"noopener\">Networks of Centres of Excellence<\/a><\/li>\n<li><a href=\"http:\/\/www.nserc-crsng.gc.ca\/\" target=\"_blank\" rel=\"noopener\">NSERC<\/a><\/li>\n<li><a href=\"http:\/\/www.jti.gov.bc.ca\/researchandinnovation\/Funding\/BCKDF\" target=\"_blank\" rel=\"noopener\">BC Knowledge Development Fund<\/a><\/li>\n<li><a href=\"http:\/\/www.alcatel-lucent.com\" target=\"_blank\" rel=\"noopener\">ALCATEL<\/a><\/li>\n<li><a href=\"http:\/\/www.nce.gc.ca\/nces-rces\/citr_e.htm\" target=\"_blank\" rel=\"noopener\">CITR<\/a><\/li>\n<li><a href=\"http:\/\/www.sunstone.com\/\" target=\"_blank\" rel=\"noopener\">Sunstone Circuits<\/a><\/li>\n<li><a href=\"http:\/\/www.bell.ca\/home\/\" target=\"_blank\" rel=\"noopener\">Bell Canada<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The main research thread pursued in the ISOT Lab lies in the rigorous development of secure and dependable computing systems and in the protection of these systems. Our recent and current research activities include the following: Development of innovative behavioral biometrics technologies and their application for continuous user authentication. Development of proactive techniques for intrusion [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>\u00a0<\/p><p>The main research thread pursued in the ISOT Lab lies in rigorous development of secure and dependable computing systems and in the protection of these systems. Our recent and current research activities include the following:<\/p><ol><li>Development of innovative behavioral biometrics technologies and their application for continuous user authentication.<\/li><li>Development of proactive techniques for intrusion detection based on Artificial Intelligence and statistical techniques.<\/li><li>Development of intelligent approaches for automating computer and network forensics investigation processes.<\/li><li>Development of an integrated framework for rigorous validation and verification of critical software systems that covers various stages of software lifecycle.<\/li><li>Development of rigorous methods for software security monitoring, testing, and measurement.<\/li><\/ol><p>Learn more about our\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/research\/current-projects\/index.php\">current<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/research\/past-projects\/index.php\">past research<\/a>.<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":35,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":1248,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/12\/revisions\/1248"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}