{"id":515,"date":"2022-11-27T23:02:38","date_gmt":"2022-11-27T23:02:38","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=515"},"modified":"2022-12-11T21:42:14","modified_gmt":"2022-12-11T21:42:14","slug":"content-security","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/content-security\/","title":{"rendered":"Content Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, \u201cAutomated detection of unstructured context-dependent sensitive information using deep learning\u201d, Journal of Internet of Things, Elsevier, Volume 16, December 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cPreventing Data Loss by Harnessing Semantic Similarity and Relevance\u201d, Journal of Internet Services and Information Security (JISIS), volume: 11, number: 2 (May 2021), pp. 78-99.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alhindi H., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S254266051930126X\">Preventing Data Leak through Semantic Analysis<\/a>\u201d, Journal of Internet of Things, Elsevier, 14 June 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cData Loss Prevention Using Document Semantic Signature\u201d, International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, Feb 11-13, 2019, Springer, Best paper award.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed H, Traore I, Saad S., \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.9\">Detecting opinion spams and fake news using text classification<\/a>\u201d,\u00a0<em>Security and Privacy<\/em>, Wiley, Volume1, Issue1, January\/February 2018.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed H., Traore I., Saad S. (2017)\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Detection%20of%20Online%20Fake%20News%20Using%20N-Gram.pdf\">Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques<\/a>. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, \u201cAutomated detection of unstructured context-dependent sensitive information using deep learning\u201d, Journal of Internet of Things, Elsevier, Volume 16, December 2021. Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cPreventing Data Loss by Harnessing Semantic Similarity and Relevance\u201d, Journal of Internet Services and Information Security (JISIS), volume: 11, number: [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ul>\r\n<li>Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, \u201cAutomated detection of unstructured context-dependent sensitive information using deep learning\u201d, Journal of Internet of Things, Elsevier, Volume 16, December 2021.<\/li>\r\n<li>Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cPreventing Data Loss by Harnessing Semantic Similarity and Relevance\u201d, Journal of Internet Services and Information Security (JISIS), volume: 11, number: 2 (May 2021), pp. 78-99.<\/li>\r\n \t<li>Alhindi H., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S254266051930126X\">Preventing Data Leak through Semantic Analysis<\/a>\u201d, Journal of Internet of Things, Elsevier, 14 June 2019.<\/li>\r\n \t<li>Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cData Loss Prevention Using Document Semantic Signature\u201d, International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, Feb 11-13, 2019, Springer, Best paper award.<\/li>\r\n \t<li>Ahmed H, Traore I, Saad S., \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.9\">Detecting opinion spams and fake news using text classification<\/a>\u201d,\u00a0<em>Security and Privacy<\/em>, Wiley, Volume1, Issue1, January\/February 2018.<\/li>\r\n \t<li>Ahmed H., Traore I., Saad S. (2017)\u00a0<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Detection%20of%20Online%20Fake%20News%20Using%20N-Gram.pdf\">Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques<\/a>. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/li>\r\n<\/ul>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,4],"tags":[],"class_list":["post-515","post","type-post","status-publish","format-standard","hentry","category-by-area","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=515"}],"version-history":[{"count":6,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/515\/revisions"}],"predecessor-version":[{"id":1153,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/515\/revisions\/1153"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}