{"id":386,"date":"2022-11-26T11:58:07","date_gmt":"2022-11-26T11:58:07","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?page_id=386"},"modified":"2022-12-11T23:54:46","modified_gmt":"2022-12-11T23:54:46","slug":"contact-us","status":"publish","type":"page","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/contact-us\/","title":{"rendered":"Contact us"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Hero&#8221; _builder_version=&#8221;4.18.0&#8243; background_image=&#8221;https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-content\/uploads\/sites\/7295\/2022\/11\/1ed4a6048c6e3f179533209284dbdb2e_How-to-Get-Computer-Help.jpg&#8221; parallax=&#8221;on&#8221; background_blend=&#8221;color-dodge&#8221; custom_padding=&#8221;0px|0|0px|0px|false|false&#8221; bottom_divider_style=&#8221;waves&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;Contact Us&#8221; text_orientation=&#8221;center&#8221; admin_label=&#8221;Fullwidth Header&#8221; _builder_version=&#8221;4.18.0&#8243; title_font=&#8221;Share Tech||||||||&#8221; title_text_align=&#8221;center&#8221; title_font_size=&#8221;80px&#8221; title_line_height=&#8221;1.2em&#8221; content_font=&#8221;Open Sans||||||||&#8221; content_text_align=&#8221;center&#8221; content_font_size=&#8221;18px&#8221; content_line_height=&#8221;1.8em&#8221; background_color=&#8221;rgba(0,0,0,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_direction=&#8221;140deg&#8221; background_color_gradient_stops=&#8221;rgba(0,72,114,0.9) 0%|rgba(41,17,96,0.8) 100%&#8221; background_color_gradient_start=&#8221;rgba(0,72,114,0.9)&#8221; background_color_gradient_end=&#8221;rgba(41,17,96,0.8)&#8221; parallax=&#8221;on&#8221; parallax_method=&#8221;on&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;15px&#8221; button_one_bg_color=&#8221;#ffa727&#8243; button_one_border_width=&#8221;15px&#8221; button_one_border_color=&#8221;#ffa727&#8243; button_one_border_radius=&#8221;100px&#8221; button_one_letter_spacing=&#8221;5px&#8221; button_one_font=&#8221;Open Sans|700||on|||||&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;4vw||4vw||true|&#8221; custom_padding_tablet=&#8221;100px||100px||true&#8221; custom_padding_phone=&#8221;|||&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; title_font_size_tablet=&#8221;60px&#8221; title_font_size_phone=&#8221;36px&#8221; title_font_size_last_edited=&#8221;on|phone&#8221; content_font_size_tablet=&#8221;&#8221; content_font_size_phone=&#8221;16px&#8221; content_font_size_last_edited=&#8221;on|phone&#8221; button_one_text_size_tablet=&#8221;&#8221; button_one_text_size_phone=&#8221;&#8221; button_one_text_size_last_edited=&#8221;on|desktop&#8221; button_one_border_color_hover=&#8221;#ff8a3d&#8221; button_one_border_radius_hover=&#8221;100px&#8221; button_one_letter_spacing_hover=&#8221;5px&#8221; button_one_bg_color_hover=&#8221;#ff8a3d&#8221; global_colors_info=&#8221;{}&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;on&#8221; button_one_border_color__hover=&#8221;#ff8a3d&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;on&#8221; button_one_border_radius__hover=&#8221;100px&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;on&#8221; button_one_letter_spacing__hover=&#8221;5px&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;on&#8221; button_one_bg_color__hover=&#8221;#ff8a3d&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; header_5_font_size=&#8221;17px&#8221; header_5_line_height=&#8221;1.5em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"card\">\n<h3>Group Coordinator<\/h3>\n<p>Dr. Issa Traore<br \/>Email: itraore at ece.uvic.ca<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; header_5_text_color=&#8221;#382b00&#8243; header_5_font_size=&#8221;13px&#8221; header_5_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font=&#8221;|600|||||||&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"card\">\n<h3>Mailing address<\/h3>\n<h5>The Information Security and Object Technology (ISOT) Research Group<br \/>Department of Electrical &amp; Computer Engineering<br \/>University of Victoria<br \/>P.O. Box 3055<br \/>STN CSC<br \/>Victoria BC<br \/>V8W 3P6<br \/>Canada<\/h5>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; custom_padding=&#8221;|419px||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"card\">\n<p><span class=\"et_pb_icon_wrap \"><span class=\"et-pb-icon\" style=\"font-size: 36px;color: #ff9800\">\ue090<\/span><\/span><br \/>\n<strong>Phone<\/strong><\/p>\n<p>(250) 721-8697<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;15px&#8221; custom_padding=&#8221;|419px||||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; text_font=&#8221;|600|||||||&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"card\">\n<p><span class=\"et_pb_icon_wrap \"><span class=\"et-pb-icon\" style=\"font-size: 36px;color: #ff9800\">\ue0fa<\/span><\/span><br \/><strong>Fax<\/strong><\/p>\n<p>(250) 721-6052<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_accordion _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; box_shadow_style=&#8221;preset3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_accordion_item title=&#8221;Journal &amp; magazine links&#8221; open=&#8221;on&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.americanscientist.org\" target=\"_blank\" rel=\"noopener\">American Scientist Online<\/a><\/li>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigcomm\" target=\"_blank\" rel=\"noopener\">Computer Communication Review<\/a><\/li>\n<li><a href=\"http:\/\/www.elsevier.com\/computerscience\" target=\"_blank\" rel=\"noopener\">Elsevier Computer Science<\/a><\/li>\n<li><a href=\"http:\/\/www.acsac.org\" target=\"_blank\" rel=\"noopener\">Annual Computer Security Applications Conference<\/a><\/li>\n<li><a href=\"http:\/\/www.computer.org\/?SMIDENTITY=NO\" target=\"_blank\" rel=\"noopener\">IEEE Computer Society<\/a><\/li>\n<li><a href=\"http:\/\/www.computer.org\/security\" target=\"_blank\" rel=\"noopener\">IEEE Security &amp; Privacy Magazine<\/a><\/li>\n<li><a href=\"http:\/\/search.ieice.or.jp\" target=\"_blank\" rel=\"noopener\">IEICE Trans Search System<\/a><\/li>\n<li><a href=\"http:\/\/www.ijde.org\" target=\"_blank\" rel=\"noopener\">International Journal of Digital Evidence<\/a><\/li>\n<li><a href=\"http:\/\/www.sciencedirect.com\/science?_ob=JournalURL&amp;_cdi=5870&amp;_auth=y&amp;_acct=C000050221&amp;_version=1&amp;_urlVersion=0&amp;_userid=10&amp;md5=8ce696f1b637fd75b38ee274c7180a97\" target=\"_blank\" rel=\"noopener\">ScienceDirect &#8211; Computers &amp; Security<\/a><\/li>\n<li><a href=\"http:\/\/portal.acm.org\/browse_dl.cfm?linked=1&amp;part=transaction&amp;idx=J789&amp;coll=ACM&amp;dl=ACM&amp;CFID=16003108&amp;CFTOKEN=80580950\" target=\"_blank\" rel=\"noopener\">ACM TISSEC (Transactions on Information &amp; System Security)<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Conference links&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigsac\/ccs\/\" target=\"_blank\" rel=\"noopener\">ACM CSC<\/a><\/li>\n<li><a href=\"http:\/\/www.acm.org\/sigs\/sigkdd\/\" target=\"_blank\" rel=\"noopener\">ACM SIGKDD<\/a><\/li>\n<li><a href=\"http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/\" target=\"_blank\" rel=\"noopener\">ISOC (Internet SOCiety) Conferences<\/a><\/li>\n<li><a href=\"http:\/\/www.acsac.org\/\" target=\"_blank\" rel=\"noopener\">Annual Computer Security Applications Conference<\/a><\/li>\n<li><a href=\"http:\/\/www.dice.ucl.ac.be\/crypto\" target=\"_blank\" rel=\"noopener\">UCL Crypto Group<\/a><\/li>\n<li><a href=\"http:\/\/www.nspw.org\/current\/\" target=\"_blank\" rel=\"noopener\">New Security Paradigms Workshop<\/a><\/li>\n<li><a href=\"http:\/\/www.raid-symposium.org\/\" target=\"_blank\" rel=\"noopener\">RAID Symposium<\/a><\/li>\n<li><a href=\"http:\/\/www.usenix.org\/\" target=\"_blank\" rel=\"noopener\">Advanced Computing Systems Association<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;Sponsored by&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; open=&#8221;off&#8221;]<\/p>\n<ul>\n<li><a href=\"http:\/\/www.plurilock.com\/\" target=\"_blank\" rel=\"noopener\">Plurilock Security Solutions Inc.<\/a><\/li>\n<li><a href=\"https:\/\/www.uvic.ca\/\" target=\"_blank\" rel=\"noopener\">University of Victoria<\/a><\/li>\n<li><a href=\"http:\/\/www.plantiga.com\/\" target=\"_blank\" rel=\"noopener\">Plantiga Technologies Inc.<\/a><\/li>\n<li><a href=\"http:\/\/www.nce.gc.ca\/\" target=\"_blank\" rel=\"noopener\">Networks of Centres of Excellence<\/a><\/li>\n<li><a href=\"http:\/\/www.nserc-crsng.gc.ca\/\" target=\"_blank\" rel=\"noopener\">NSERC<\/a><\/li>\n<li><a href=\"http:\/\/www.jti.gov.bc.ca\/researchandinnovation\/Funding\/BCKDF\" target=\"_blank\" rel=\"noopener\">BC Knowledge Development Fund<\/a><\/li>\n<li><a href=\"http:\/\/www.alcatel-lucent.com\" target=\"_blank\" rel=\"noopener\">ALCATEL<\/a><\/li>\n<li><a href=\"http:\/\/www.nce.gc.ca\/nces-rces\/citr_e.htm\" target=\"_blank\" rel=\"noopener\">CITR<\/a><\/li>\n<li><a href=\"http:\/\/www.sunstone.com\/\" target=\"_blank\" rel=\"noopener\">Sunstone Circuits<\/a><\/li>\n<li><a href=\"http:\/\/www.bell.ca\/home\/\" target=\"_blank\" rel=\"noopener\">Bell Canada<\/a><\/li>\n<\/ul>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Group Coordinator Dr. Issa TraoreEmail: itraore at ece.uvic.ca Mailing address The Information Security and Object Technology (ISOT) Research GroupDepartment of Electrical &amp; Computer EngineeringUniversity of VictoriaP.O. Box 3055STN CSCVictoria BCV8W 3P6Canada \ue090 Phone (250) 721-8697 \ue0faFax (250) 721-6052 American Scientist Online Computer Communication Review Elsevier Computer Science Annual Computer Security Applications Conference IEEE Computer Society [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-386","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":19,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/386\/revisions"}],"predecessor-version":[{"id":1245,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/pages\/386\/revisions\/1245"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}