{"id":383,"date":"2022-11-26T11:43:26","date_gmt":"2022-11-26T11:43:26","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=383"},"modified":"2022-12-11T09:34:02","modified_gmt":"2022-12-11T09:34:02","slug":"book-chapters","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/26\/book-chapters\/","title":{"rendered":"Book chapters"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">Issa Traore, \u201cContinuous Authentication\u201d, In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Brocardo M., Traore I., and I. Woungang, \u201cContinuous Authentication using Writing Style\u201d, In M. Obaidat, I. Traore, I. Woungang (eds). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. Pages 211-232, September 2018.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Mason E., Traore I., and I. Woungang, \u201cFacets and Promises of Gait Biometric Recognition\u201d, In: M. Obaidat, I. Traore, I. Woungang (eds). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. Pages 233-255, September 2018.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Aldribi A., Traore I., Moa B. \u201cData Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation\u201d. In: Mishra B., Das H., Dehuri S., Jagadev A. (eds) Cloud Computing for Optimization: Foundations, Applications, and Challenges. Studies in Big Data, pp 333-366, vol 39., February 2018, Springer, Cham.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, \u201cSoftware Security Engineering: Part II\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 256-284 (35 pages), March 2013.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, \u201cSoftware Security Engineering: Part I\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 221-255 (35 pages), March 2013.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, A. A. E. Ahmed, \u201cIntroduction to continuous authentication\u201d, in Continuous Authentication based on Biometrics: Data, Models, and Metrics, I. Traore and A. Ahmed (Eds.), IGI Publishing, pages 1-12, ISBN 978-1-61350-129, 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, A. A. E. Ahmed, \u201cPerformance metrics and models for continuous authentication systems\u201d, in Continuous Authentication based on Biometrics: Data, Models, and Metrics, I. Traore and A. Ahmed (Eds.), IGI Publishing, pages 1-12, ISBN 978-1-61350-129, 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Abdelhalim A., Traore I. (2010) RBDT-1 Method: Combining Rules and Decision Tree Capabilities. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems Engineering. Lecture Notes in Electrical Engineering, vol 68. Springer, Dordrecht.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A.A.E Ahmed, I. Traore, \u201cMouse dynamics biometric technology\u201d, in Behavioral Biometrics for Human Identification: Intelligent Applications, L. Wang and X. Geng (Eds.), IGI Publishing, pages 207-223, August 2009.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A.A.E Ahmed and I. Traore, \u201cEmployee surveillance based on free text detection of keystroke dynamics\u201d, in Handbook of Research on Social and Organizational Liabilities in Information Security, Manish Gupta and Raj Sharman (Eds.), Idea Group Publishing, pages 47-63, December 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. A.E. Ahmed, I. Traore, \u201cBehavioral biometrics for online computer user monitoring\u201d, Image Pattern Recognition: Synthesis and Analysis in Biometrics, S. Yanushkevich et al. (Eds.), World Scientific Publishing, pp. 141-161, (21 pages); May 2007.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Issa Traore, \u201cContinuous Authentication\u201d, In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. 2021. Brocardo M., Traore I., and I. Woungang, \u201cContinuous Authentication using Writing Style\u201d, In M. Obaidat, I. Traore, I. Woungang (eds). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. Pages 211-232, September 2018. Mason [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ul>\r\n<li>Issa Traore, \u201cContinuous Authentication\u201d, In: Jajodia, S., Samarati, P., Yung, M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg. 2021.\r\n<\/li>\r\n \t<li>Brocardo M., Traore I., and I. Woungang, \u201cContinuous Authentication using Writing Style\u201d, In M. Obaidat, I. Traore, I. Woungang (eds). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. Pages 211-232, September 2018.<\/li>\r\n \t<li>Mason E., Traore I., and I. Woungang, \u201cFacets and Promises of Gait Biometric Recognition\u201d, In: M. Obaidat, I. Traore, I. Woungang (eds). Biometric-Based Physical and Cybersecurity Systems. Springer International Publishing. Pages 233-255, September 2018.<\/li>\r\n \t<li>Aldribi A., Traore I., Moa B. \u201cData Sources and Datasets for Cloud Intrusion Detection Modeling and Evaluation\u201d. In: Mishra B., Das H., Dehuri S., Jagadev A. (eds) Cloud Computing for Optimization: Foundations, Applications, and Challenges. Studies in Big Data, pp 333-366, vol 39., February 2018, Springer, Cham.<\/li>\r\n \t<li>I. Traore, I. Woungang, \u201cSoftware Security Engineering: Part II\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 256-284 (35 pages), March 2013.<\/li>\r\n \t<li>I. Traore, I. Woungang, \u201cSoftware Security Engineering: Part I\u201d in Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, pages 221-255 (35 pages), March 2013.<\/li>\r\n \t<li>I. Traore, A. A. E. Ahmed, \u201cIntroduction to continuous authentication\u201d, in Continuous Authentication based on Biometrics: Data, Models, and Metrics, I. Traore and A. Ahmed (Eds.), IGI Publishing, pages 1-12, ISBN 978-1-61350-129, 2012.<\/li>\r\n \t<li>I. Traore, A. A. E. Ahmed, \u201cPerformance metrics and models for continuous authentication systems\u201d, in Continuous Authentication based on Biometrics: Data, Models, and Metrics, I. Traore and A. Ahmed (Eds.), IGI Publishing, pages 1-12, ISBN 978-1-61350-129, 2012.<\/li>\r\n \t<li>Abdelhalim A., Traore I. (2010) RBDT-1 Method: Combining Rules and Decision Tree Capabilities. In: Ao SI., Rieger B., Amouzegar M. (eds) Machine Learning and Systems Engineering. Lecture Notes in Electrical Engineering, vol 68. Springer, Dordrecht.<\/li>\r\n \t<li>A.A.E Ahmed, I. Traore, \u201cMouse dynamics biometric technology\u201d, in Behavioral Biometrics for Human Identification: Intelligent Applications, L. Wang and X. Geng (Eds.), IGI Publishing, pages 207-223, August 2009.<\/li>\r\n \t<li>A.A.E Ahmed and I. Traore, \u201cEmployee surveillance based on free text detection of keystroke dynamics\u201d, in Handbook of Research on Social and Organizational Liabilities in Information Security, Manish Gupta and Raj Sharman (Eds.), Idea Group Publishing, pages 47-63, December 2008.<\/li>\r\n \t<li>A. A.E. Ahmed, I. Traore, \u201cBehavioral biometrics for online computer user monitoring\u201d, Image Pattern Recognition: Synthesis and Analysis in Biometrics, S. Yanushkevich et al. (Eds.), World Scientific Publishing, pp. 141-161, (21 pages); May 2007.<\/li>\r\n<\/ul>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-383","post","type-post","status-publish","format-standard","hentry","category-complete-list","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":7,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/383\/revisions"}],"predecessor-version":[{"id":1091,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/383\/revisions\/1091"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}