{"id":557,"date":"2022-11-27T23:43:39","date_gmt":"2022-11-27T23:43:39","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=557"},"modified":"2022-12-11T09:27:40","modified_gmt":"2022-12-11T09:27:40","slug":"conferences","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/conferences\/","title":{"rendered":"Conferences"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">C. Nie, P. G. Quinan, I. Traor\u00e9 and I. Woungang, &#8220;Intrusion Detection using a Graphical Fingerprint Model,&#8221; 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109\/CCGrid54584.2022.00095.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, Periklis Chatzimi, \u201cEdge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure\u201d, 2022 IEEE International Conference on Communications (ICC2022), 16-20 May 2022, Seoul, Republic of Korea, pp. 847-852, doi: 10.1109\/ICC45855.2022.9838679.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, \u201cUnsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events\u201d, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, \u00c9., Boumerdassi, S., M\u00fchlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117\u2013130<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Moghaddam Parisa, Iqbal Shahrear, Traore Issa, \u201cA Framework for Secure Logging in Precision Healthcare Cloud-based Services\u201d, 2021 IEEE International Conference on Digital Health (ICDH), 05-10 September 2021, Chicago, IL, USA, pp. 212-214, doi: 10.1109\/ICDH52753.2021.00038.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Sondhi, S. Saad, K. Shi, M. Mamun, and I. Traore, &#8220;Chaos Engineering for Understanding Consensus Algorithms Performance in Permissioned Blockchains,&#8221; 19th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC), 25-28 October 2021, AB, Canada, pp. 51-59, (Best Paper).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cSecurity- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems\u201d, 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication (WIDECOM 2020), Springer-Lecture Notes on Data Engineering and Communications Technologies, vol. 51, Toronto, Canada, May 6-8, 2020.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, L. Barolli, \u201cMalware Detection Using Machine Learning Models\u201d, 23-rd International Conference on Network-Based Information Systems (NBiS-2020), August 31st &#8211; September 2nd, 2020, Victoria, Canada.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., \u201cArguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative\u201d. In: Boumerdassi S., Renault \u00c9., M\u00fchlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, \u201cAutomated Event Prioritization for Security Operation Center using Deep Learning\u201d, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. \u201cDetecting Ransomware in Encrypted Web Traffic\u201d. The 12th International Symposium on Foundations &amp; Practice of Security, Toulouse, France, November 5-7, 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Mohammed Alshahrani, Issa Traore, and Sherif Saad. (2019). \u201cLightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History\u201d. The 12th International Symposium on Foundations &amp; Practice of Security, Toulouse, France, November 5-7, 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Mohammed Alshahrani, Issa Traore. (2019). Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). The 6th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alshahrani M., I. Traore, I. Woungang, \u201cAnonymous IoT Mutual Inter-device Authentication Scheme based on Incremental Counter\u201d, the 7th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2019), 26-28 August 2019, Istanbul, Turkey.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Asem Ghaleb, Issa Traore, Karim Ganame, \u201cA Framework Architecture for Agentless Cloud Endpoint Security Monitoring\u201d, 2019 IEEE Conference on Communications and Network Security (CNS): Workshops: SPC: 5th IEEE Workshop on Security and Privacy in the Cloud, 10-12 June 2019, Washington DC, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cData Loss Prevention Using Document Semantic Signature\u201d, International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, Feb 11-13, 2019, Springer, Best paper award.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed H., Traore I., Saad S. (2017) Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alenazi A., Traore I., Ganame K., Woungang I. (2017) Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Kitana, I. Traore, I. Woungang, \u201cImpact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network\u201d, 11th International Conference on Malicious and Unwanted Software (MALCON) 2016, October 18-21, 2016, Fajardo, Puerto Rico.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, \u201cImproving Vulnerabilities Detection Measurement \u2013 Test Suites and Software Security Assurance\u201d, 20<sup>th<\/sup>\u00a0ACM International Conference on Evaluation and Assessment in Software Engineering (EASE \u201916), June 01 &#8211; 03, 2016, Limerick, Ireland.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, Y. Nakkabi, S. Saad, B. Sayed, J. D. Ardigo, \u201cEnsuring Online Exam Integrity through Continuous Biometric Authentication\u201d, 1<sup>st<\/sup>\u00a0Information Security Assurance and Trust Workshop (I-SAT 2016), Vancouver, BC, Canada, June 2016.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">F. Alshanketi, I. Traore, A. Awad Ahmed, \u201cImproving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication\u201d, Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016), co-located with 37<sup>th<\/sup>\u00a0IEEE Security &amp; Privacy Symposium (IEEE S&amp;P 2016), May 26, 2016, San Jose, CA, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Brocardo, R.F. Custodio, C.R. De Rolt, J.D.S. Dias, Julio Da Silva, and I. Traore, \u201cSharing Privacy Information in Credit Analysis Environment\u201d, 9<sup>th<\/sup>\u00a0International Conference on\u00a0Complex, Intelligent, and Software Intensive Systems (CISIS), 2015, Florianopolis, Santa Catarina, Brazil.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Aldribi, I. Traore, \u201cA Game Theoretic Framework for Cloud Security Transparency\u201d, 10<sup>th<\/sup>\u00a0International Conference on Network and System Security (NSS 2015), November 3-5, New York, NY, USA, Volume 9408 of the series Lecture Notes in Computer Science, pages 488-500.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Aldribi, G. Letourneau , I. Traore, \u201cCloud Slicing &#8211; A\u00a0 new Architecture for Cloud Security Monitoring\u201d, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2015<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">E. Johnson, I. Traore, \u201cSMS Botnet Detection for Android Devices through Intent Capture and Modeling\u201d, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshops, pages 36-41, Sept. 28 2015-Oct. 1 2015, Montreal, Quebec, Canada<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">\u00a0S. Hari Shankar, I. Woungang, S. K. Dhurandher, I. Traore, S.B. Kaleel, \u201cE-MAntNet: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks\u201d, \u00a029<sup>th<\/sup>\u00a0IEEE International Conference on Advanced Information Networking and Applications (AINA-2015)\u00a0, Gwangju, Korea, March 25-27, 2015.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, M.L. Brocardo, &#8220;Context-Aware Intrusion Alerts Verification Approach&#8221;\u00a0The 10<sup>th<\/sup>\u00a0International Conference on Information Assurance and Security (IAS 2014), Okinawa, Japan, 27-29 November 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., \u201cIn-Cloud Malware Analysis and Detection: State of the Art\u201d, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alam, S.; Traore, I.; Sogukpinar, I., \u201cCurrent Trends and the Future of Metamorphic Malware Detection\u201d, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">B. Sayed, I. Traore, A. Abdelhalim, \u201cDetection and Mitigation of Malicious JavaScript Using Information Flow Control\u201d, 12<sup>th<\/sup>\u00a0Annual Conference on Privacy, Security and Trust (PST2014), Toronto, Ontario, Canada, July 22-24, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">\u00a0I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, \u201cCombining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments\u201d, 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, pages 138-145<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Sherif Saad; Issa Traore; Marcelo Luiz Brocardo.\u00a0&#8220;<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=7064620&amp;url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7064620\" target=\"_blank\" rel=\"noopener\">Context-aware intrusion alerts verification approach<\/a>&#8220;, 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Marcelo Luiz Brocardo, Issa Traore.\u00a0&#8220;Continuous Authentication using Micro-Messages&#8221;, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang.\u00a0&#8220;Toward a Framework for Continuous Authentication using Stylometry&#8221;, The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">B. Sayed, I. Traore, \u201cInformation Flow Control Model for Protection against Web 2.0 Client-side Web Attacks\u201d, 10th International Symposium on Frontiers of Information Systems and Network Applications (FINA 2014) co-located with 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alam, N. Horpool, I. Traore, \u201cMARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection\u201d, 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. K. Dhurandher, I. Woungang, I. Traore, \u201cC-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks\u201d, 10th International Workshop on Heterogeneous Wireless Networks (HWISE2014) of AINA2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alam, N. Horspool, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/alam-paper-sin-2013.pdf\" target=\"_blank\" rel=\"noopener\">MAIL: Malware Analysis Intermediate Language &#8211; A Step Towards Automating and Optimizing Malware Detection<\/a>&#8220;, Accepted, Proc. of 6th ACM International Conference on Security of Information and Networks (SIN 2013), November 26-28, 2013, Aksaray, Turkey.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang,\u00a0<a class=\"pdf\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6705711&amp;tag=1\" target=\"_blank\" rel=\"noopener\">&#8220;Authorship Verification for Short Messages Using Stylometry&#8221;<\/a>, Proc. of the IEEE Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2013), Piraeus-Athens, Greece, May 7-8, 2013 (<em>Best Paper Award<\/em>).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICDH2012-v1-aug28.pdf\" target=\"_blank\" rel=\"noopener\">Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments<\/a>&#8220;, 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Woungang, S. K. Dhurandher, V. Koo, and I. Traore, \u201c&#8217;Comparison of Two Security Protocols for Preventing Packet Dropping and Message Tampering Attacks on AODV-Based Mobile Ad Hoc Networks\u201d, 4th IEEE International Workshop on Mobility Management in the Networks of the Future World (IEEE GlobeCom -MobiWorld 2012), December 3-7 2012, Anaheim, CA, USA, (7 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/FPS2012-v0.3.pdf\" target=\"_blank\" rel=\"noopener\">Extracting Attack Scenarios Using Intrusion Semantics<\/a>&#8220;, 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, &#8220;Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks&#8221;, 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26, Montreal, QC, Canada.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">D. Zhao, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/3PGCIC-2012.pdf\" target=\"_blank\" rel=\"noopener\">P2P Botnet Detection through Malicious Fast Flux Network Identification<\/a>&#8220;, 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing -3PGCIC 2012, November 12-14, 2012, Victoria, BC, Canada, (6 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alharbi, B. Moa, J. Weber-Jahnke, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/HPCS2012.pdf\" target=\"_blank\" rel=\"noopener\">High-Performance Proactive Digital Forensics<\/a>&#8220;, High Performance Computing System Conference \u2013 HPCS 2012, Vancouver, BC, Canada, May 1-3, 2012, (15 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;A Semantic-based Approach to Minimize IDS Alerts Flooding&#8221;, 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu.\u00a0<a class=\"pdf\" title=\"Peer to Peer Botnet Detection Based on Flow Intervals\" href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/paper\/p2pBotnet.pdf\" target=\"_blank\" rel=\"noopener\">&#8220;Peer to Peer Botnet Detection Based on Flow Intervals&#8221;<\/a>. Information Security and Privacy Research, IFIP Advances in Information and Communication Technology Volume 376, 2012, pp 87-102.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IAS2011.pdf\" target=\"_blank\" rel=\"noopener\">A semantic analysis approach to manage IDS alerts flooding<\/a>&#8220;, Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Ahmed, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/2011-acsac-paper.pdf\" target=\"_blank\" rel=\"noopener\">Dynamic sample size detection in continuous authentication using sequential sampling<\/a>&#8220;, Proceedings of Annual Computer Security Applications Conference (ACSAC), Dec. 5-9, 2011, Orlando, Florida, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Alharbi, J. Weber-Jahnke, I. Traore, &#8220;The proactive and reactive digital forensics investigation process: a systematic literature review&#8221;, Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15-17, 2011, Brno, Czech Republic.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, &#8220;Detecting P2P botnets through network behavior analysis and machine learning&#8221;, Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;Method ontology for intelligent network forensics analysis&#8221;, Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">P. Everaere, I. Simplot-Ryl, I. Traore, &#8220;Double spending protection for e-cash based on risk management&#8221;, Proceedings of 13th Information Security Conference (ISC), October 25-28, 2010, Boca Raton, Florida, USA; Lecture Notes in Computer Science, vol. 6531, pp. 394-408 (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, &#8220;UML-based performance modeling of dstributed software systems&#8221;, Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, &#8220;Performance analysis of distributed software systems: a sodel-driven approach&#8221;, Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Saad, I. Traore, &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Ontology-v2.0.pdf\" target=\"_blank\" rel=\"noopener\">Ontology-based intelligent network forensics<\/a>&#8220;, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore, &#8220;Unsupervised identity application fraud detection using rule-based decision tree&#8221;, Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim and I. Traore, &#8220;A new method for learning decision trees from rules&#8221;, In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA&#8217;09), Miami, Florida, USA, December 13-15, 2009.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore, B. Sayed. &#8220;RBDT-1: a new rule-based decision tree generation technique&#8221;, In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Abdelhalim, I. Traore. &#8220;Converting declarative rules into decision trees&#8221;, In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">O. Mohamed, I. Traore, &#8220;Cognitive-based biometrics system for static User authentication&#8221;, in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice\/Mestre, Italy.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Hoole, I. Simplot-Ryl, I. Traore, &#8220;Integrating contract-based security monitors in the software development life cycle&#8221;, in the Proceedings of 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008), Malta, November 27-28, 2008, (6 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">O. Mohamed, I. Traore, &#8220;Cognitive-based biometrics system for static User authentication&#8221;, in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice\/Mestre, Italy.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. L. Yanguo, I. Traore, A.M. Hoole, &#8220;A service-oriented framework for quantitative security analysis of software architectures&#8221;, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Hoole, I. Traore, &#8220;Contract-based security monitors for service-oriented software architecture&#8221;, in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Ahmed, I. Traore, A. Almulhem, &#8220;Digital fingerprinting based on keystroke dynamics&#8221;, Proceedings of 2nd International Symposium on Human Aspects of Information Security and Assurance (HAISA), 8-9 July 2008, Plymouth, UK, (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Y.M. Liu, I. Traore, &#8220;Systematic security analysis for service-oriented software architectures&#8221;, in the Proceedings of 3rd IEEE International Workshop on Service-Oriented System Engineering (SOSE07), to be held in Hong-Kong, China, on Oct. 24-26, 2007 (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Almulhem and I. Traore, &#8220;A survey of connection chains detection techniques&#8221;, in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A. Adelhalim and I. Traore, &#8220;Impact of google hacking on identity and application fraud&#8221;, in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem A. and I. Traore, &#8220;Mining and detecting connections chains in network traffic&#8221;, in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle &amp; S. Marsh (Eds), (acceptance rate: 30%).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A.M. Hoole and I. Traore, &#8220;A secure document management tool for scalable collaborative environments&#8221;, in Proceedings of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, July 30, 2007, Moncton, New Brunswick, Canada, (12 pages), in conjunction with IFIPTM07.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Y. Liu, I. Traore, &#8220;Complexity measures for secure service-oriented software architecture&#8221;, to be published in the Proceedings of the 3rd IEEE International Predictor Models in Software Engineering (PROMISE) Workshop, May 20, 2007, Minneapolis, Minnesota, USA, in conjunction with 29th International Conference on Software Engineering (ICSE); (10 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">D. Ghindici, G. Grimaud, I. Ryl, Y. Liu, I. Traore, &#8220;Integrated security verification and validation: case study&#8221;, Proceedings of 2nd IEEE LCN Workshop on Network Security, Tampa, Florida, U.S.A., 14 November 2006.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. Lu, I. Traore, A novel evolutionary clustering algorithm based on Gaussian mixture model, Proceedings of the 10th WSEAS International Conference on COMPUTERS, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006 (acceptance rate: 47%).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Liu, M.Y., and I. Traore, &#8220;Empirical relations between attackability and coupling: a case study on DoS&#8221;, Proc. of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), P. 57-64, Ottawa, Canada, June 2006.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu, W., I. Traore, &#8220;A novel unsupervised anomaly detection framework for detecting network attacks in real-time&#8221;, 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, (acceptance rate: 23%, 28\/118), Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmeddt et al. (Eds.).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu, W., and I. Traore, &#8220;A new evolutionary algorithm for determining the optimal number of clusters&#8221;, Proceedings of 2005 IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna, Austria, November 28-30 (acceptance rate: 38%).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu, W., and I. Traore, &#8220;Determining the optimal number of clusters using a new evolutionary algorithm&#8221;, 17th IEEE International Conference on Tools with Artificial Intelligence, Hong-Kong, pp. 712-713, November 14-16, 2005 (acceptance rate: 47%).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Awad, A., and I. Traore, &#8220;Detecting computer intrusions using behavioral biometrics&#8221;, 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, pp. 91-98, October 12-14, 2005 (acceptance rate: 36%, 18\/50).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Liu, M.Y., and I. Traore, &#8220;Measurement framework for software privilege protection based on user interaction analysis&#8221;, 11th IEEE International Software Metrics Symposium, Como, Italy, September, 19-22, 2005. (acceptance rate: 40%).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu, W., and I. Traore, &#8220;An unsupervised approach for detecting DDOS attacks based on traffic-based metrics&#8221;, 10th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, Victoria, BC, Canada, pp. 462-465, August 24-26, 2005.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Khan, S., and I. Traore, &#8220;A prevention model for algorithmic complexity attacks&#8221;, Conference on Detection of Intrusions and Malware &amp; Vulnerability Assessment (DIMVA) (30% acc. rate), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed, A.A.E., and I. Traore, &#8220;Anomaly intrusion detection based on biometrics&#8221;, accepted for 6th IEEE Information Assurance Workshop, West Point, New York, USA, June 15-17 (acceptance rate 51%; 2 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">S. Khan, I. Traore, &#8220;Queue-based analysis of DoS attacks&#8221;, Proceedings of 6th IEEE Information Assurance Workshop, 15-17 June, West Point, New York, USA, Pages 266-273, (acceptance rate: 51%; 8 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem, A., and I. Traore, &#8220;Experience with engineering a network forensics system,&#8221; International Conference on Information Networking (ICOIN2005), Jeju, Korea, January 2005, Lecture Notes in Computer Science (LNCS) Vol. 3391, pp. 62-71, Springer-Verlag 2005, Editor: C. Kim, (acc. rate: 24%, 102\/427).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, Issa Traore, &#8220;UML-based security measures of software products&#8221;, International Workshop on Methodologies for Pervasive and Embedded Software (MOMPES\u0412\u201904), 4th International Conference on Application of Concurrency to System Design (ACSD-04), Hamilton, Ontario, Canada, June 2004.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, H. M. Al Jamal, Y. M. Liu, A.E.K. Sahraoui, &#8220;UML-PVS requirements specification and verification&#8221;, 2004 International Symposium of the International Council on Systems Engineering (INCOSE-04), Toulouse, France, June 2004.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I Traore, S. Khan, &#8220;A protection scheme for scalable collaborative environments&#8221;, ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, &#8220;A transition-based strategy for object-oriented software testing&#8221;, ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">M. Y. Liu, I. Traore, &#8220;PVS proof-patterns for UML-based verification&#8221;, IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 8-11 2002, Lund, Sweden, pp 9-19.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, &#8220;An integrated V&amp;V environment for critical systems development&#8221;, 5th IEEE International Symposium on Requirements Engineering (RE\u0412\u201901), 27-31 August 2001, Toronto, Canada, pp 287.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, &#8220;Automating the integration of heterogeneous software components&#8221;, First ASERC Workshop on Software Architecture, 24-25 August 2001, Edmonton, Alberta, Canada.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, D.B. Aredo, &#8220;Integrating formal V&amp;V and structured design reviews&#8221;, Workshop on Inspections in Software Engineering (WISE\u0412\u201901), CAV\u0412\u201901 Conference, 23rd July 2001, Paris, France, pp 30-39.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, &#8220;A step towards rigorous integration of heterogeneous software components&#8221;, International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA&#8217;2001), 25-28 June 2001, Las Vegas, Nevada, USA.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore. &#8220;A framework for rigorous testing of object-oriented programs&#8221;, IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 20th 2001, Washington D.C., USA, pp. 33-39.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">D.B. Aredo, I. Traore, K. Stolen, Oct. 6-8, 1999, &#8220;An outline of PVS semantics for UML class diagrams&#8221;, 11th Nordic Workshop on Programming Theory (NWPT&#8217;99), O6-8 October, 1999, Uppsala, Sweden, pp. 49.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, D. B. Aredo, K. Stolen, September 1999, &#8220;Formal development of open distributed systems: towards an integrated framework&#8221;, PLI&#8217;99 Conference, Workshop on Object-Oriented Specification Techniques for Distributed Systems and Behaviours (OOSDS\u0412\u201999), 27th September, Paris, France.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, A.E.K. Sahraoui, July 5-9, 1999, &#8220;The control kernel: a contribution to complex reactive systems modeling with VDM&#8221;, 14th World Congress of IFAC, 5-9 July, 1999, Beijing, P.R. China, Vol. Q, pp. 245-250.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, A.E.K. Sahraoui, &#8220;Integrating formal methods in the development process of distributed systems: an approach with statemate and VDM&#8221;, 15th IFAC Workshop on Distributed Computer Control Systems (DCCS&#8217;98), 9-11 September, 1998, Como, Italy, pp.65-70.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore, A. Jeoffroy, M. Romdhani, A.E.K. Sahraoui, P. de Chazelles, &#8220;An experience with a multiformalism specification of an avionics system&#8221;, 8th International Symposium of the International Council on Systems Engineering (INCOSE), Vancouver-Canada, 26-30 July, 1998, pp 723-730.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I.Traore and A.E.K. Sahraoui, &#8220;A multiformalism specification framework with statecharts and VDM&#8221;, 22nd IFAC\/IFIP Workshop on Real-Time Programming (WRTP\u0412\u201997), Lyon, France, September 15-17, 1997, pp. 63-68.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">P.D. Zijderveld, I. Traore, R.A. Vingerhoeds, A.E.K. Sahraoui, &#8220;Timing specification and rule-based systems&#8221;, IEEE\/Euromicro Conference on Real-Time, Toledo-Spain, 11-13 June, 1997.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">I. Traore and A.E.K. Sahraoui, &#8220;Timing extensions in object analysis&#8221;, IEEE\/CESA&#8217;96 IMACS Multi-conference: Symposium on Discrete Events and Manufacturing Systems, Lille, France, July 9-12, 1996, pp. 358-363.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C. Nie, P. G. Quinan, I. Traor\u00e9 and I. Woungang, &#8220;Intrusion Detection using a Graphical Fingerprint Model,&#8221; 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109\/CCGrid54584.2022.00095. Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, Periklis Chatzimi, \u201cEdge-Assisted Secure and Dependable Optimal Policies [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ul>\r\n \t<li>C. Nie, P. G. Quinan, I. Traor\u00e9 and I. Woungang, \"Intrusion Detection using a Graphical Fingerprint Model,\" 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid), Taormina, Italy, 16-19 May 2022, pp. 806-813, doi: 10.1109\/CCGrid54584.2022.00095.<\/li>\r\n \t<li>Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, Periklis Chatzimi, \u201cEdge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure\u201d, 2022 IEEE International Conference on Communications (ICC2022), 16-20 May 2022, Seoul, Republic of Korea, pp. 847-852, doi: 10.1109\/ICC45855.2022.9838679.<\/li>\r\n \t<li>paulo Gustavo Quinan, Issa Traore, Ujwal Reddy Ghondi, Isaac Woungang, \u201cUnsupervised Anomaly Detection using a new Knowledge Graph Model for Network Activity and Events\u201d, 4th International Conference on Machine Learning for Networking (MLN), 2021, Paris, France. In: Renault, \u00c9., Boumerdassi, S., M\u00fchlethaler, P. (eds) Machine Learning for Networking. MLN 2021. Lecture Notes in Computer Science, vol 13175. Springer, Cham. pp 117\u2013130<\/li>\r\n \t<li>Moghaddam Parisa, Iqbal Shahrear, Traore Issa, \u201cA Framework for Secure Logging in Precision Healthcare Cloud-based Services\u201d, 2021 IEEE International Conference on Digital Health (ICDH), 05-10 September 2021, Chicago, IL, USA, pp. 212-214, doi: 10.1109\/ICDH52753.2021.00038.<\/li>\r\n \t<li>S. Sondhi, S. Saad, K. Shi, M. Mamun, and I. Traore, \"Chaos Engineering for Understanding Consensus Algorithms Performance in Permissioned Blockchains,\" 19th IEEE Intl Conf on Dependable, Autonomic and Secure Computing (DASC), 25-28 October 2021, AB, Canada, pp. 51-59, (Best Paper).<\/li>\r\n \t<li>Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cSecurity- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems\u201d, 3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication (WIDECOM 2020), Springer-Lecture Notes on Data Engineering and Communications Technologies, vol. 51, Toronto, Canada, May 6-8, 2020.<\/li>\r\n \t<li>Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, L. Barolli, \u201cMalware Detection Using Machine Learning Models\u201d, 23-rd International Conference on Network-Based Information Systems (NBiS-2020), August 31st - September 2nd, 2020, Victoria, Canada.<\/li>\r\n \t<li>Nwamuo O., de Faria Quinan P.M., Traore I., Woungang I., Aldribi A., \u201cArguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative\u201d. In: Boumerdassi S., Renault \u00c9., M\u00fchlethaler P. (eds) Machine Learning for Networking. MLN 2019. Lecture Notes in Computer Science, vol 12081. Springer, Cham<\/li>\r\n \t<li>Nitika Gupta, Issa Traore, Paulo Magella Faria de Quinan, \u201cAutomated Event Prioritization for Security Operation Center using Deep Learning\u201d, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, USA, 9-12 Dec. 2019.<\/li>\r\n \t<li>Jaimin Modi, Issa Traore, Asem Ghaleb, Karim Ganame, Sherif Ahmed. \u201cDetecting Ransomware in Encrypted Web Traffic\u201d. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.<\/li>\r\n \t<li>Mohammed Alshahrani, Issa Traore, and Sherif Saad. (2019). \u201cLightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History\u201d. The 12th International Symposium on Foundations & Practice of Security, Toulouse, France, November 5-7, 2019.<\/li>\r\n \t<li>Mohammed Alshahrani, Issa Traore. (2019). Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). The 6th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain.<\/li>\r\n \t<li>Alshahrani M., I. Traore, I. Woungang, \u201cAnonymous IoT Mutual Inter-device Authentication Scheme based on Incremental Counter\u201d, the 7th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2019), 26-28 August 2019, Istanbul, Turkey.<\/li>\r\n \t<li>Asem Ghaleb, Issa Traore, Karim Ganame, \u201cA Framework Architecture for Agentless Cloud Endpoint Security Monitoring\u201d, 2019 IEEE Conference on Communications and Network Security (CNS): Workshops: SPC: 5th IEEE Workshop on Security and Privacy in the Cloud, 10-12 June 2019, Washington DC, USA.<\/li>\r\n \t<li>Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cData Loss Prevention Using Document Semantic Signature\u201d, International Conference on Wireless, Intelligent, and Distributed Environment for Communication (WIDECOM 2019), Milan, Italy, Feb 11-13, 2019, Springer, Best paper award.<\/li>\r\n \t<li>Ahmed H., Traore I., Saad S. (2017) Detection of Online Fake News Using N-Gram Analysis and Machine Learning Techniques. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/li>\r\n \t<li>Ahluwalia A., Traore I., Ganame K., Agarwal N. (2017) Detecting Broad Length Algorithmically Generated Domains. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/li>\r\n \t<li>Alenazi A., Traore I., Ganame K., Woungang I. (2017) Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. In: Traore I., Woungang I., Awad A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science, vol 10618. Springer, Cham<\/li>\r\n \t<li>A. Kitana, I. Traore, I. Woungang, \u201cImpact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network\u201d, 11th International Conference on Malicious and Unwanted Software (MALCON) 2016, October 18-21, 2016, Fajardo, Puerto Rico.<\/li>\r\n \t<li>A. Hoole, I. Traore, A. Delaitre, C. de Oliveira, \u201cImproving Vulnerabilities Detection Measurement \u2013 Test Suites and Software Security Assurance\u201d, 20<sup>th<\/sup>\u00a0ACM International Conference on Evaluation and Assessment in Software Engineering (EASE \u201916), June 01 - 03, 2016, Limerick, Ireland.<\/li>\r\n \t<li>I. Traore, Y. Nakkabi, S. Saad, B. Sayed, J. D. Ardigo, \u201cEnsuring Online Exam Integrity through Continuous Biometric Authentication\u201d, 1<sup>st<\/sup>\u00a0Information Security Assurance and Trust Workshop (I-SAT 2016), Vancouver, BC, Canada, June 2016.<\/li>\r\n \t<li>F. Alshanketi, I. Traore, A. Awad Ahmed, \u201cImproving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication\u201d, Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioSTAR 2016), co-located with 37<sup>th<\/sup>\u00a0IEEE Security & Privacy Symposium (IEEE S&P 2016), May 26, 2016, San Jose, CA, USA.<\/li>\r\n \t<li>M. Brocardo, R.F. Custodio, C.R. De Rolt, J.D.S. Dias, Julio Da Silva, and I. Traore, \u201cSharing Privacy Information in Credit Analysis Environment\u201d, 9<sup>th<\/sup>\u00a0International Conference on\u00a0Complex, Intelligent, and Software Intensive Systems (CISIS), 2015, Florianopolis, Santa Catarina, Brazil.<\/li>\r\n \t<li>A. Aldribi, I. Traore, \u201cA Game Theoretic Framework for Cloud Security Transparency\u201d, 10<sup>th<\/sup>\u00a0International Conference on Network and System Security (NSS 2015), November 3-5, New York, NY, USA, Volume 9408 of the series Lecture Notes in Computer Science, pages 488-500.<\/li>\r\n \t<li>A. Aldribi, G. Letourneau , I. Traore, \u201cCloud Slicing - A\u00a0 new Architecture for Cloud Security Monitoring\u201d, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), 2015<\/li>\r\n \t<li>E. Johnson, I. Traore, \u201cSMS Botnet Detection for Android Devices through Intent Capture and Modeling\u201d, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshops, pages 36-41, Sept. 28 2015-Oct. 1 2015, Montreal, Quebec, Canada<\/li>\r\n \t<li>\u00a0S. Hari Shankar, I. Woungang, S. K. Dhurandher, I. Traore, S.B. Kaleel, \u201cE-MAntNet: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks\u201d, \u00a029<sup>th<\/sup>\u00a0IEEE International Conference on Advanced Information Networking and Applications (AINA-2015)\u00a0, Gwangju, Korea, March 25-27, 2015.<\/li>\r\n \t<li>S. Saad, I. Traore, M.L. Brocardo, \"Context-Aware Intrusion Alerts Verification Approach\"\u00a0The 10<sup>th<\/sup>\u00a0International Conference on Information Assurance and Security (IAS 2014), Okinawa, Japan, 27-29 November 2014.<\/li>\r\n \t<li>Alam, S.; Sogukpinar, I.; Traore, I.; Coady, Y., \u201cIn-Cloud Malware Analysis and Detection: State of the Art\u201d, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.<\/li>\r\n \t<li>Alam, S.; Traore, I.; Sogukpinar, I., \u201cCurrent Trends and the Future of Metamorphic Malware Detection\u201d, Proc. of 7th ACM International Conference on Security of Information and Networks (SIN 2014), September 9-11, 2014, Glasgow, UK.<\/li>\r\n \t<li>B. Sayed, I. Traore, A. Abdelhalim, \u201cDetection and Mitigation of Malicious JavaScript Using Information Flow Control\u201d, 12<sup>th<\/sup>\u00a0Annual Conference on Privacy, Security and Trust (PST2014), Toronto, Ontario, Canada, July 22-24, 2014.<\/li>\r\n \t<li>\u00a0I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, \u201cCombining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments\u201d, 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, pages 138-145<\/li>\r\n \t<li>Sherif Saad; Issa Traore; Marcelo Luiz Brocardo.\u00a0\"<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&arnumber=7064620&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D7064620\" target=\"_blank\" rel=\"noopener\">Context-aware intrusion alerts verification approach<\/a>\", 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan, Nov 28-30, 2014.<\/li>\r\n \t<li>Marcelo Luiz Brocardo, Issa Traore.\u00a0\"Continuous Authentication using Micro-Messages\", Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), Toronto, Canada, July 23-24, 2014.<\/li>\r\n \t<li>Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang.\u00a0\"Toward a Framework for Continuous Authentication using Stylometry\", The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13, 2014.<\/li>\r\n \t<li>B. Sayed, I. Traore, \u201cInformation Flow Control Model for Protection against Web 2.0 Client-side Web Attacks\u201d, 10th International Symposium on Frontiers of Information Systems and Network Applications (FINA 2014) co-located with 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.<\/li>\r\n \t<li>S. Alam, N. Horpool, I. Traore, \u201cMARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection\u201d, 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 13-16, 2014.<\/li>\r\n \t<li>S. K. Dhurandher, I. Woungang, I. Traore, \u201cC-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks\u201d, 10th International Workshop on Heterogeneous Wireless Networks (HWISE2014) of AINA2014.<\/li>\r\n \t<li>S. Alam, N. Horspool, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/alam-paper-sin-2013.pdf\" target=\"_blank\" rel=\"noopener\">MAIL: Malware Analysis Intermediate Language - A Step Towards Automating and Optimizing Malware Detection<\/a>\", Accepted, Proc. of 6th ACM International Conference on Security of Information and Networks (SIN 2013), November 26-28, 2013, Aksaray, Turkey.<\/li>\r\n \t<li>Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang,\u00a0<a class=\"pdf\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6705711&tag=1\" target=\"_blank\" rel=\"noopener\">\"Authorship Verification for Short Messages Using Stylometry\"<\/a>, Proc. of the IEEE Intl. Conference on Computer, Information and Telecommunication Systems (CITS 2013), Piraeus-Athens, Greece, May 7-8, 2013 (<em>Best Paper Award<\/em>).<\/li>\r\n \t<li>I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, and I. Lai, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/ICDH2012-v1-aug28.pdf\" target=\"_blank\" rel=\"noopener\">Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments<\/a>\", 4th IEEE International Conference on Digital Home (ICDH 2012), Guangzhou, China, November 23-25, 2012, (8 pages).<\/li>\r\n \t<li>I. Woungang, S. K. Dhurandher, V. Koo, and I. Traore, \u201c'Comparison of Two Security Protocols for Preventing Packet Dropping and Message Tampering Attacks on AODV-Based Mobile Ad Hoc Networks\u201d, 4th IEEE International Workshop on Mobility Management in the Networks of the Future World (IEEE GlobeCom -MobiWorld 2012), December 3-7 2012, Anaheim, CA, USA, (7 pages).<\/li>\r\n \t<li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/FPS2012-v0.3.pdf\" target=\"_blank\" rel=\"noopener\">Extracting Attack Scenarios Using Intrusion Semantics<\/a>\", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26 2012, Montreal, QC, Canada (16 pages).<\/li>\r\n \t<li>I. Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, \"Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks\", 5th International Symposium on Foundations and Practice of Security (FPS 2012), October 25-26, Montreal, QC, Canada.<\/li>\r\n \t<li>D. Zhao, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/3PGCIC-2012.pdf\" target=\"_blank\" rel=\"noopener\">P2P Botnet Detection through Malicious Fast Flux Network Identification<\/a>\", 7th International Conference on P2P, Parallel, Grid, Cloud, and Internet Computing -3PGCIC 2012, November 12-14, 2012, Victoria, BC, Canada, (6 pages).<\/li>\r\n \t<li>S. Alharbi, B. Moa, J. Weber-Jahnke, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/HPCS2012.pdf\" target=\"_blank\" rel=\"noopener\">High-Performance Proactive Digital Forensics<\/a>\", High Performance Computing System Conference \u2013 HPCS 2012, Vancouver, BC, Canada, May 1-3, 2012, (15 pages).<\/li>\r\n \t<li>S. Saad, I. Traore, \"A Semantic-based Approach to Minimize IDS Alerts Flooding\", 7th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2012), May 01-03, 2012, Seoul, South Korea, (10 pages).<\/li>\r\n \t<li>David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu.\u00a0<a class=\"pdf\" title=\"Peer to Peer Botnet Detection Based on Flow Intervals\" href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/paper\/p2pBotnet.pdf\" target=\"_blank\" rel=\"noopener\">\"Peer to Peer Botnet Detection Based on Flow Intervals\"<\/a>. Information Security and Privacy Research, IFIP Advances in Information and Communication Technology Volume 376, 2012, pp 87-102.<\/li>\r\n \t<li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IAS2011.pdf\" target=\"_blank\" rel=\"noopener\">A semantic analysis approach to manage IDS alerts flooding<\/a>\", Proceedings of 7th Annual Conference on Information Assurance and Security (IAS 2011), Dec 5-8, 2011 Malacca, Malaysia (6 pages).<\/li>\r\n \t<li>A. Ahmed, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/2011-acsac-paper.pdf\" target=\"_blank\" rel=\"noopener\">Dynamic sample size detection in continuous authentication using sequential sampling<\/a>\", Proceedings of Annual Computer Security Applications Conference (ACSAC), Dec. 5-9, 2011, Orlando, Florida, USA.<\/li>\r\n \t<li>S. Alharbi, J. Weber-Jahnke, I. Traore, \"The proactive and reactive digital forensics investigation process: a systematic literature review\", Proceedings of International Conference on Information Security and Assurance (ISA 2011), August 15-17, 2011, Brno, Czech Republic.<\/li>\r\n \t<li>Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, \"Detecting P2P botnets through network behavior analysis and machine learning\", Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Quebec, Canada (8 pages).<\/li>\r\n \t<li>S. Saad, I. Traore, \"Method ontology for intelligent network forensics analysis\", Proceedings of 8th Annual Conference on Privacy, Security and Trust (PST2010), Aug. 17-19, 2010, Ottawa, Canada (8 pages).<\/li>\r\n \t<li>P. Everaere, I. Simplot-Ryl, I. Traore, \"Double spending protection for e-cash based on risk management\", Proceedings of 13th Information Security Conference (ISC), October 25-28, 2010, Boca Raton, Florida, USA; Lecture Notes in Computer Science, vol. 6531, pp. 394-408 (8 pages).<\/li>\r\n \t<li>I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, \"UML-based performance modeling of dstributed software systems\", Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).<\/li>\r\n \t<li>I. Traore, I. Woungang, A. Ahmed, M.S. Obaidat, \"Performance analysis of distributed software systems: a sodel-driven approach\", Proceedings of 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS10), July 11-14, Ottawa, Canada (8 pages).<\/li>\r\n \t<li>S. Saad, I. Traore, \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/SEDE10-Ontology-v2.0.pdf\" target=\"_blank\" rel=\"noopener\">Ontology-based intelligent network forensics<\/a>\", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (7 pages).<\/li>\r\n \t<li>A. Abdelhalim, I. Traore, \"Unsupervised identity application fraud detection using rule-based decision tree\", Proceedings of 19th International Conference on Software Engineering and Data Engineering (SEDE2010), June 16-18, 2010, San Francisco, CA, USA (8 pages).<\/li>\r\n \t<li>A. Abdelhalim and I. Traore, \"A new method for learning decision trees from rules\", In the Proceedings of 8th International Conference on Machine Learning and Applications (ICMLA'09), Miami, Florida, USA, December 13-15, 2009.<\/li>\r\n \t<li>A. Abdelhalim, I. Traore, B. Sayed. \"RBDT-1: a new rule-based decision tree generation technique\", In the Proceedings of 3rd International Symposium on Rules, Applications and Interoperability (RuleML09), Las Vegas, Nevada, USA: Nov 5-7, 2009, (14 pages).<\/li>\r\n \t<li>A. Abdelhalim, I. Traore. \"Converting declarative rules into decision trees\", In the Proceedings of the International Conference on Computer Science and Applications, San Francisco, USA, 20-22 October, 2009; (9 pages).<\/li>\r\n \t<li>O. Mohamed, I. Traore, \"Cognitive-based biometrics system for static User authentication\", in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice\/Mestre, Italy.<\/li>\r\n \t<li>A. Hoole, I. Simplot-Ryl, I. Traore, \"Integrating contract-based security monitors in the software development life cycle\", in the Proceedings of 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2008), Malta, November 27-28, 2008, (6 pages).<\/li>\r\n \t<li>O. Mohamed, I. Traore, \"Cognitive-based biometrics system for static User authentication\", in the Proceedings of the 4th International Conference on Internet Monitoring and Protection (ICIMP 2009), May 24-28, 2009, Venice\/Mestre, Italy.<\/li>\r\n \t<li>M. L. Yanguo, I. Traore, A.M. Hoole, \"A service-oriented framework for quantitative security analysis of software architectures\", in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/li>\r\n \t<li>M. Hoole, I. Traore, \"Contract-based security monitors for service-oriented software architecture\", in the Proceedings of IEEE International Workshop on Dependable and Secure Service Computing 2008 (DSSC2008), Dec. 9-12, Jioasi, Yilan, Taiwan, in conjunction with IEEE APSCC 2008.<\/li>\r\n \t<li>A. Ahmed, I. Traore, A. Almulhem, \"Digital fingerprinting based on keystroke dynamics\", Proceedings of 2nd International Symposium on Human Aspects of Information Security and Assurance (HAISA), 8-9 July 2008, Plymouth, UK, (10 pages).<\/li>\r\n \t<li>Y.M. Liu, I. Traore, \"Systematic security analysis for service-oriented software architectures\", in the Proceedings of 3rd IEEE International Workshop on Service-Oriented System Engineering (SOSE07), to be held in Hong-Kong, China, on Oct. 24-26, 2007 (10 pages).<\/li>\r\n \t<li>A. Almulhem and I. Traore, \"A survey of connection chains detection techniques\", in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/li>\r\n \t<li>A. Adelhalim and I. Traore, \"Impact of google hacking on identity and application fraud\", in the Proceedings of the 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, August 22-24, 2007, Victoria, BC, Canada, (4 pages).<\/li>\r\n \t<li>Almulhem A. and I. Traore, \"Mining and detecting connections chains in network traffic\", in Proceedings of IFITM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30-August 2, 2007, Moncton, New Brunswick, Canada, pp. 47-57, (11 pages), Springer, ISBN: 13: 978-0-387-73654-9, S. Etalle & S. Marsh (Eds), (acceptance rate: 30%).<\/li>\r\n \t<li>A.M. Hoole and I. Traore, \"A secure document management tool for scalable collaborative environments\", in Proceedings of the First International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, July 30, 2007, Moncton, New Brunswick, Canada, (12 pages), in conjunction with IFIPTM07.<\/li>\r\n \t<li>Y. Liu, I. Traore, \"Complexity measures for secure service-oriented software architecture\", to be published in the Proceedings of the 3rd IEEE International Predictor Models in Software Engineering (PROMISE) Workshop, May 20, 2007, Minneapolis, Minnesota, USA, in conjunction with 29th International Conference on Software Engineering (ICSE); (10 pages).<\/li>\r\n \t<li>D. Ghindici, G. Grimaud, I. Ryl, Y. Liu, I. Traore, \"Integrated security verification and validation: case study\", Proceedings of 2nd IEEE LCN Workshop on Network Security, Tampa, Florida, U.S.A., 14 November 2006.<\/li>\r\n \t<li>W. Lu, I. Traore, A novel evolutionary clustering algorithm based on Gaussian mixture model, Proceedings of the 10th WSEAS International Conference on COMPUTERS, ID. 534-365, Vouliagmeni, Athens, Greece, July 13-15, 2006 (acceptance rate: 47%).<\/li>\r\n \t<li>Liu, M.Y., and I. Traore, \"Empirical relations between attackability and coupling: a case study on DoS\", Proc. of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS), P. 57-64, Ottawa, Canada, June 2006.<\/li>\r\n \t<li>Lu, W., I. Traore, \"A novel unsupervised anomaly detection framework for detecting network attacks in real-time\", 4th International Conference on Cryptology and Network Security (CANS), Xiamen, Fujian Province, China, 14-16 December, 2005, (acceptance rate: 23%, 28\/118), Lecture Notes in Computer Science, Vol. 3810, Pages: 96-109, ISBN 3-540-30849-0, Springer, 2005, Y.G Desmeddt et al. (Eds.).<\/li>\r\n \t<li>Lu, W., and I. Traore, \"A new evolutionary algorithm for determining the optimal number of clusters\", Proceedings of 2005 IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA), 28-30 November 2005, Vienna, Austria, November 28-30 (acceptance rate: 38%).<\/li>\r\n \t<li>Lu, W., and I. Traore, \"Determining the optimal number of clusters using a new evolutionary algorithm\", 17th IEEE International Conference on Tools with Artificial Intelligence, Hong-Kong, pp. 712-713, November 14-16, 2005 (acceptance rate: 47%).<\/li>\r\n \t<li>Awad, A., and I. Traore, \"Detecting computer intrusions using behavioral biometrics\", 3rd Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, pp. 91-98, October 12-14, 2005 (acceptance rate: 36%, 18\/50).<\/li>\r\n \t<li>Liu, M.Y., and I. Traore, \"Measurement framework for software privilege protection based on user interaction analysis\", 11th IEEE International Software Metrics Symposium, Como, Italy, September, 19-22, 2005. (acceptance rate: 40%).<\/li>\r\n \t<li>Lu, W., and I. Traore, \"An unsupervised approach for detecting DDOS attacks based on traffic-based metrics\", 10th IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing, Victoria, BC, Canada, pp. 462-465, August 24-26, 2005.<\/li>\r\n \t<li>Khan, S., and I. Traore, \"A prevention model for algorithmic complexity attacks\", Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (30% acc. rate), Vienna, Austria, July 7-8, 2005, Lecture Notes in Computer Science (LNCS), Springer, K. Julisch and C. Kruegel (Eds.), LNCS 3548, pp. 160-173, 2005.<\/li>\r\n \t<li>Ahmed, A.A.E., and I. Traore, \"Anomaly intrusion detection based on biometrics\", accepted for 6th IEEE Information Assurance Workshop, West Point, New York, USA, June 15-17 (acceptance rate 51%; 2 pages).<\/li>\r\n \t<li>S. Khan, I. Traore, \"Queue-based analysis of DoS attacks\", Proceedings of 6th IEEE Information Assurance Workshop, 15-17 June, West Point, New York, USA, Pages 266-273, (acceptance rate: 51%; 8 pages).<\/li>\r\n \t<li>Almulhem, A., and I. Traore, \"Experience with engineering a network forensics system,\" International Conference on Information Networking (ICOIN2005), Jeju, Korea, January 2005, Lecture Notes in Computer Science (LNCS) Vol. 3391, pp. 62-71, Springer-Verlag 2005, Editor: C. Kim, (acc. rate: 24%, 102\/427).<\/li>\r\n \t<li>M. Y. Liu, Issa Traore, \"UML-based security measures of software products\", International Workshop on Methodologies for Pervasive and Embedded Software (MOMPES\u0412\u201904), 4th International Conference on Application of Concurrency to System Design (ACSD-04), Hamilton, Ontario, Canada, June 2004.<\/li>\r\n \t<li>I. Traore, H. M. Al Jamal, Y. M. Liu, A.E.K. Sahraoui, \"UML-PVS requirements specification and verification\", 2004 International Symposium of the International Council on Systems Engineering (INCOSE-04), Toulouse, France, June 2004.<\/li>\r\n \t<li>I Traore, S. Khan, \"A protection scheme for scalable collaborative environments\", ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.<\/li>\r\n \t<li>I. Traore, \"A transition-based strategy for object-oriented software testing\", ACM Symposium on Applied Computing, March 9-12, 2003, Melbourne, Florida, USA.<\/li>\r\n \t<li>M. Y. Liu, I. Traore, \"PVS proof-patterns for UML-based verification\", IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 8-11 2002, Lund, Sweden, pp 9-19.<\/li>\r\n \t<li>I. Traore, \"An integrated V&V environment for critical systems development\", 5th IEEE International Symposium on Requirements Engineering (RE\u0412\u201901), 27-31 August 2001, Toronto, Canada, pp 287.<\/li>\r\n \t<li>I. Traore, \"Automating the integration of heterogeneous software components\", First ASERC Workshop on Software Architecture, 24-25 August 2001, Edmonton, Alberta, Canada.<\/li>\r\n \t<li>I. Traore, D.B. Aredo, \"Integrating formal V&V and structured design reviews\", Workshop on Inspections in Software Engineering (WISE\u0412\u201901), CAV\u0412\u201901 Conference, 23rd July 2001, Paris, France, pp 30-39.<\/li>\r\n \t<li>I. Traore, \"A step towards rigorous integration of heterogeneous software components\", International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2001), 25-28 June 2001, Las Vegas, Nevada, USA.<\/li>\r\n \t<li>I. Traore. \"A framework for rigorous testing of object-oriented programs\", IEEE ECBS Conference, Workshop on Formal Specification of Computer-Based Systems (FSBCS), April 20th 2001, Washington D.C., USA, pp. 33-39.<\/li>\r\n \t<li>D.B. Aredo, I. Traore, K. Stolen, Oct. 6-8, 1999, \"An outline of PVS semantics for UML class diagrams\", 11th Nordic Workshop on Programming Theory (NWPT'99), O6-8 October, 1999, Uppsala, Sweden, pp. 49.<\/li>\r\n \t<li>I. Traore, D. B. Aredo, K. Stolen, September 1999, \"Formal development of open distributed systems: towards an integrated framework\", PLI'99 Conference, Workshop on Object-Oriented Specification Techniques for Distributed Systems and Behaviours (OOSDS\u0412\u201999), 27th September, Paris, France.<\/li>\r\n \t<li>I. Traore, A.E.K. Sahraoui, July 5-9, 1999, \"The control kernel: a contribution to complex reactive systems modeling with VDM\", 14th World Congress of IFAC, 5-9 July, 1999, Beijing, P.R. China, Vol. Q, pp. 245-250.<\/li>\r\n \t<li>I. Traore, A.E.K. Sahraoui, \"Integrating formal methods in the development process of distributed systems: an approach with statemate and VDM\", 15th IFAC Workshop on Distributed Computer Control Systems (DCCS'98), 9-11 September, 1998, Como, Italy, pp.65-70.<\/li>\r\n \t<li>I. Traore, A. Jeoffroy, M. Romdhani, A.E.K. Sahraoui, P. de Chazelles, \"An experience with a multiformalism specification of an avionics system\", 8th International Symposium of the International Council on Systems Engineering (INCOSE), Vancouver-Canada, 26-30 July, 1998, pp 723-730.<\/li>\r\n \t<li>I.Traore and A.E.K. Sahraoui, \"A multiformalism specification framework with statecharts and VDM\", 22nd IFAC\/IFIP Workshop on Real-Time Programming (WRTP\u0412\u201997), Lyon, France, September 15-17, 1997, pp. 63-68.<\/li>\r\n \t<li>P.D. Zijderveld, I. Traore, R.A. Vingerhoeds, A.E.K. Sahraoui, \"Timing specification and rule-based systems\", IEEE\/Euromicro Conference on Real-Time, Toledo-Spain, 11-13 June, 1997.<\/li>\r\n \t<li>I. Traore and A.E.K. Sahraoui, \"Timing extensions in object analysis\", IEEE\/CESA'96 IMACS Multi-conference: Symposium on Discrete Events and Manufacturing Systems, Lille, France, July 9-12, 1996, pp. 358-363.<\/li>\r\n<\/ul>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-557","post","type-post","status-publish","format-standard","hentry","category-complete-list","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=557"}],"version-history":[{"count":7,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/557\/revisions"}],"predecessor-version":[{"id":1082,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/557\/revisions\/1082"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}