{"id":229,"date":"2022-11-20T16:47:39","date_gmt":"2022-11-20T16:47:39","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=229"},"modified":"2022-12-11T21:51:18","modified_gmt":"2022-12-11T21:51:18","slug":"biometrics-technologies","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/20\/biometrics-technologies\/","title":{"rendered":"Biometrics Technologies"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;Semantic-aware Attack Scenario Reconstruction&#8221;,\u00a0<em>Journal of Information Security and Applications,<\/em>\u00a0Elsevier, Volume 18, Issue 1, July 2013, Pages 53\u201367.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/JIAS-final.pdf\">Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis<\/a>&#8220;, Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/FPS2012-v0.3.pdf\" target=\"_blank\" rel=\"noopener\">Extracting Attack Scenarios Using Intrusion Semantics<\/a>&#8220;, 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;A Semantic-based Approach to Minimize IDS Alerts Flooding&#8221;, 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. &#8220;<a href=\"http:\/\/iopscience.iop.org\/1742-6596\/385\/1\/012003\" target=\"_blank\" rel=\"noopener\">High Performance Proactive Digital Forensics<\/a>&#8220;. High Performance Computing Symposium (HPCS), Vancouver, 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alharbi, J. Weber-Jahnke, I. Traore, &#8220;The proactive and reactive digital forensics investigation process: a systematic literature review&#8221;, Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15 &#8211; 17, 2011, Brno, Czech Republic.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alharbi, J. H. Weber-Jahnke, and I. Traore. &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IJSIA.pdf\">The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review<\/a>&#8220;. International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IAS2011.pdf\" target=\"_blank\" rel=\"noopener\">A semantic analysis approach to manage IDS alerts flooding<\/a>&#8220;, Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/PST2010_Saad_Method%20ontology%20for%20intelligent%20network%20forensics%20analysis.pdf\">Method ontology for intelligent network forensics analysis<\/a>&#8220;, Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Ontology-v2.0.pdf\" target=\"_blank\" rel=\"noopener\">Ontology-based intelligent network forensics<\/a>&#8220;, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Almulhem, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensicsx\/IJNS-forensics-2010.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Detecting connection chains: a data mining approach&#8221;<\/a>, to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Almulhem, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/ijcnds-lang-17.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Profiling distributed connection chains&#8221;<\/a>, International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Almulhem and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/cc-pacrim07-18.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;A survey of connection chains detection techniques&#8221;<\/a>, in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem A. and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/ifiptm07-19.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Mining and detecting connections chains in network traffic&#8221;<\/a>, in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle &amp; S. Marsh (Eds).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Almulhem and Issa Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/almulhem05.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Experience with engineering a network forensics system&#8221;<\/a>, Lecture Notes in Computer Science, Springer-Verlag, 2005, (Proceedings of the International Conference on Information Networking (ICOIN2005), Jeju, Korea, Jan 2005).<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>S. Saad, I. Traore, &#8220;Semantic-aware Attack Scenario Reconstruction&#8221;,\u00a0Journal of Information Security and Applications,\u00a0Elsevier, Volume 18, Issue 1, July 2013, Pages 53\u201367. S. Saad, I. Traore, &#8220;Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis&#8221;, Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012. S. Saad, I. Traore, &#8220;Extracting Attack Scenarios [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ol><li>S. Saad, I. Traore, \"Semantic-aware Attack Scenario Reconstruction\",\u00a0<em>Journal of Information Security and Applications,<\/em>\u00a0Elsevier, Volume 18, Issue 1, July 2013, Pages 53\u201367.<\/li><li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/JIAS-final.pdf\">Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis<\/a>\", Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.<\/li><li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/FPS2012-v0.3.pdf\" target=\"_blank\" rel=\"noopener\">Extracting Attack Scenarios Using Intrusion Semantics<\/a>\", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).<\/li><li>S. Saad, I. Traore, \"A Semantic-based Approach to Minimize IDS Alerts Flooding\", 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).<\/li><li>S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. \"<a href=\"http:\/\/iopscience.iop.org\/1742-6596\/385\/1\/012003\" target=\"_blank\" rel=\"noopener\">High Performance Proactive Digital Forensics<\/a>\". High Performance Computing Symposium (HPCS), Vancouver, 2012.<\/li><li>S. Alharbi, J. Weber-Jahnke, I. Traore, \"The proactive and reactive digital forensics investigation process: a systematic literature review\", Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15 - 17, 2011, Brno, Czech Republic.<\/li><li>S. Alharbi, J. H. Weber-Jahnke, and I. Traore. \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IJSIA.pdf\">The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review<\/a>\". International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.<\/li><li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IAS2011.pdf\" target=\"_blank\" rel=\"noopener\">A semantic analysis approach to manage IDS alerts flooding<\/a>\", Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).<\/li><li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/PST2010_Saad_Method%20ontology%20for%20intelligent%20network%20forensics%20analysis.pdf\">Method ontology for intelligent network forensics analysis<\/a>\", Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).<\/li><li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Ontology-v2.0.pdf\" target=\"_blank\" rel=\"noopener\">Ontology-based intelligent network forensics<\/a>\", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).<\/li><li>A. Almulhem, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensicsx\/IJNS-forensics-2010.pdf\" target=\"_blank\" rel=\"noopener\">\"Detecting connection chains: a data mining approach\"<\/a>, to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/li><li>A. Almulhem, I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/ijcnds-lang-17.pdf\" target=\"_blank\" rel=\"noopener\">\"Profiling distributed connection chains\"<\/a>, International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.<\/li><li>A. Almulhem and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/cc-pacrim07-18.pdf\" target=\"_blank\" rel=\"noopener\">\"A survey of connection chains detection techniques\"<\/a>, in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/li><li>Almulhem A. and I. Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/network-forensics\/ifiptm07-19.pdf\" target=\"_blank\" rel=\"noopener\">\"Mining and detecting connections chains in network traffic\"<\/a>, in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds).<\/li><li>A. Almulhem and Issa Traore,\u00a0<a class=\"pdf\" href=\"http:\/\/www.isot.ece.uvic.ca\/publications\/conferences\/almulhem05.pdf\" target=\"_blank\" rel=\"noopener\">\"Experience with engineering a network forensics system\"<\/a>, Lecture Notes in Computer Science, Springer-Verlag, 2005, (Proceedings of the International Conference on Information Networking (ICOIN2005), Jeju, Korea, Jan 2005).<\/li><\/ol>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-229","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=229"}],"version-history":[{"count":5,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/229\/revisions"}],"predecessor-version":[{"id":1169,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/229\/revisions\/1169"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}