{"id":562,"date":"2022-11-27T23:46:05","date_gmt":"2022-11-27T23:46:05","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=562"},"modified":"2022-12-11T09:19:35","modified_gmt":"2022-12-11T09:19:35","slug":"journals","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/27\/journals\/","title":{"rendered":"Journals"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cAdmission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System\u201d, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109\/JSYST.2022.3207019<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">W. A. Yousef, I. Traore and W. Briguglio, &#8220;Classifier Calibration: with application to threat scores in cybersecurity\u201d, IEEE Transactions on Dependable and Secure Computing, doi: 10.1109\/TDSC.2022.3170011., April 2022.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Waleed Yousef, Issa Traore, William Briguglio, \u201cUN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring\u201d, IEEE Transactions on Information Forensics and Security, Volume 16, Pages: 5195 &#8211; 5210, 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">William Briguglio, Parisa Moghaddam, Waleed A. Yousef, Issa Traor\u00e9, Mohammad Mamun, \u201cMachine Learning in Precision Medicine to Preserve Privacy via Encryption\u201d, Pattern Recognition Letters, Elsevier, Volume 151, November 2021, Pages 148-154.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hadeer Ahmed, Issa Traore, Sherif Saad, Mohammad Mamun, \u201cAutomated detection of unstructured context-dependent sensitive information using deep learning\u201d, Journal of Internet of Things, Elsevier, Volume 16, December 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hanan Alhindi, Issa Traore, and Isaac Woungang, \u201cPreventing Data Loss by Harnessing Semantic Similarity and Relevance\u201d, Journal of Internet Services and Information Security (JISIS), volume: 11, number: 2 (May 2021), pp. 78-99.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cOptimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure\u201d, IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1260-1274, June 2021.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Asem Kitana, Issa Traore, Isaac Woungang, \u201cTowards an Epidemic SMS-based Cellular Botnet\u201d, Journal of Internet Services and Information Security (JISIS), Volume 10, Number 4, Pages 38\u201358, November 2020.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cWhen Agile Security Meets 5G\u201d, IEEE Access, Volume 8, pages 166212 \u2013 166225, September 2020<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Glaucio H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, \u201cOptimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks\u201d, IEEE Systems Journal, July 2020, pages 1-12.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Moneer Fakroon, Mohammed Alshahrani, Fayez Gebali, Issa Traore, \u201cSecure remote anonymous user authentication scheme for smart home environment\u201d, Journal of Internet of Things, Elsevier, Volume 9, March 2020, (citations: 7).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Abdulaziz Aldribi, Issa Traore, Belaid Moa, Onyekachi Nwamuo, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404819301907\">Hypervisor-Based Cloud Intrusion Detection through Online Multivariate Statistical Change Tracking<\/a>\u201d, Computers &amp; Security, Elsevier, Volume 88, January 2020.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Brijesh Jethva, Issa Traor\u00e9, Asem Ghaleb, Karim Ganame, Sherif Ahmed, \u201c<a href=\"https:\/\/content.iospress.com\/articles\/journal-of-computer-security\/jcs191346\">Multilayer Ransomware Detection using Grouped Registry Key Operations, File Entropy and File Signature Monitoring<\/a>\u201d Journal of Computer Security, Volume 28, Number 3, 2020, pages 337-373.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alhindi H., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S254266051930126X\">Preventing Data Leak through Semantic Analysis<\/a>\u201d, Journal of Internet of Things, Elsevier, 14 June 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alshahrani M., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660519301556\">Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique<\/a>\u201d, Journal of Internet of Things, Elsevier, Volume 7, September 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alshahrani M., Traore I., \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212618306987\">Secure Mutual Authentication and Automated Access Control for IoT Smart Home using Cumulative Keyed-hash chain<\/a>\u201d, Journal of Information Security and Applications, Elsevier, Volume 45, April 2019, Pages 156-175.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alshanketi F., Traore I., and A. Awad, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.48\">Multimodal Mobile Keystroke Dynamics Biometrics Combining Fixed and Variable passwords<\/a>\u201d, Journal of Security &amp; Privacy, Wiley, Volume 2, Issue 1, January\/February 2019.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Sayed, I. Traore, A. Abdelhalim, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818300397\">If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript<\/a>\u201d, Journal of Computers &amp; Security, Elsevier, 75 (2018) 92\u2013117.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore I., M. Alshaharani, M. Obaidat, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.44\">State of the Art and Perspectives on Traditional and Emerging Biometrics: A Survey<\/a>\u201d,\u00a0<em>Journal of Security and Privacy<\/em>, Wiley, Vol. 1 Issue 6, November\/December 2018.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed H, Traore I, Saad S., \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.9\">Detecting opinion spams and fake news using text classification<\/a>\u201d,\u00a0<em>Security and Privacy<\/em>, Wiley, Volume1, Issue1, January\/February 2018.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/dac.3259\">Authorship Verification Using Deep Belief Network Systems<\/a>\u201d, International Journal of Communication Systems, Wiley, Volume 30,\u00a0Issue 12, August 2017.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Brocardo, R. F. Custodio, C. R. De Rolt, J.D.S., and I. Traore, \u201cPrivacy Information in a Positive Credit System\u201d, International Journal of Grid and Utility Computing, Vol.8 No.1, pp.61 &#8211; 69, February 2017.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Kitana, I. Traore, I. Woungang, \u201c<a href=\"http:\/\/isyou.info\/jisis\/vol6\/no2\/jisis-2016-vol6-no2-01.pdf\">Impact Study of a Mobile Botnet over LTE Networks<\/a>\u201d, Journal of Internet Services and Information Security, Vol. 6, No. 2, pages 1-22, May 2016.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Abdelhalim and I. Traore, Y. Nakkabi, \u201cCreating decision trees from rules using RBDT-1\u201d,\u00a0<em>Computational Intelligence<\/em>, Volume 32, Issue 2, May 2016, Pages 216\u2013239, Wiley.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alam, S.; Sogukpinar, I.; Traore, I; Horspool, N. R., \u201c<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11416-014-0222-y\">Sliding window of difference and control flow weight for metamorphic malware detection<\/a>\u201d,\u00a0<em>Journal of Computer Virology and Hacking Techniques<\/em>, Springer, May 2015,\u00a0Volume 11, Issue 2, pp 75\u201388.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alam, R. N. Horspool, I. Traore, I. Sogukpinar, \u201cA framework for metamorphic malware analysis and real-time detection\u201d,\u00a0<em>Computers &amp; Security<\/em>, Volume 48, February 2015, Pages 212\u2013233.S.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alam, I. Traore, \u0130. So\u011fukp\u0131nar, \u201cAnnotated Control Flow Graph for Metamorphic Malware Detection\u201d.\u00a0<em>The Computer Journal<\/em>, Oxford Press, Volume 58 Issue 10 October 2015.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang.\u00a0&#8220;<a href=\"http:\/\/dx.doi.org\/10.1016\/j.jcss.2014.12.019\">Authorship verification of e-mail and tweet messages applied for continuous authentication<\/a>&#8220;, Journal of Computer and System Sciences, Available online 29 December 2014, ISSN 0022-0000.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Moein, F. Gebali, I. Traore, \u201cAnalysis of Covert Hardware Attacks\u201d,\u00a0<em>Journal of Convergence<\/em>, Volume 5, Number 3, pp. 26-30, September 2014.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, and I. Lai, \u201c<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Online%20risk-based%20authentication%20using%20behavioral%20biometrics.pdf\">Online Risk-based Authentication using Behavioral Biometrics<\/a>\u201d,\u00a0<em>Journal of Multimedia Tools and Applications<\/em>, Springer, July 2014, 71(2): 575-605.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang. &#8220;<a href=\"http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/jnw091233473355\">Verifying Online User Identity using Stylometric Analysis for Short Messages<\/a>&#8220;, Journal of Networks 9, no. 12 (2014): 3347-3355.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">A.E, Ahmed, I. Traore, &#8220;Free Text Recognition of Keystrokes&#8221;,\u00a0<em>IEEE Transactions on Cybernetics<\/em>, Vol. 44 No. 4, April 2014, pp. 458-472 (14 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Saad, I. Traore, \u201cSemantic-aware Attack Scenario Reconstruction\u201d,\u00a0<em>Journal of Information Security and Applications<\/em>, Elsevier, Volume 18, Issue 1, July 2013, Pages 53\u201367.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, &#8220;Botnet Detection based on Traffic Behavior Analysis and Flow Intervals&#8221;, Computer &amp; Security, Elsevier, vol. 39, 2013, pp. 2-16.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Sayed, I. Traore, I Woungang, M.S. Obaidat, &#8220;Static Authentication based on Mouse Gestures&#8221;, IEEE Systems Journal, Vol. 7, No.2, June 2013, pages 262-274.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, and B. Khalilian, &#8220;Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication&#8221;, IEEE Transactions on Systems, Man, and Cybernetics Part B, Vol. 42 No. 5, October 2012, pages 1343-1356.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Saad, I. Traore. &#8220;Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis&#8221;, Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. &#8220;<a href=\"http:\/\/iopscience.iop.org\/1742-6596\/385\/1\/012003\">High Performance Proactive Digital Forensics<\/a>&#8220;. High Performance Computing Symposium (HPCS), Vancouver, 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Alharbi, J. H. Weber-Jahnke, and I. Traore. &#8220;<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IJSIA.pdf\">The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review<\/a>&#8220;. International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hamdy, I. Traore, &#8220;Homogenous physio-behavioral visual and mouse biometric&#8221;, ACM Transactions on Computer Human Interactions, Volume 18 Issue 3, July 2011.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, &#8220;A framework for bottleneck analysis in high-performance software design&#8221;, Journal of Internet Technology (JIT), Vol. 13, No. 3, 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, &#8220;Software performance modeling using the UML: a case study&#8221;, Journal of Networks (JNW), Academy Publisher, Vol. 7, No. 1, January 2012.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Hoole, I. Traore, I. Simplot-Ryl, &#8220;Application of contract-based security assertion monitoring framework for telecommunications software engineering&#8221;, Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nakkabi, , I. Traore, A. A. E Ahmed, &#8220;Improving mouse dynamics biometric performance using variance reduction with separate extractors&#8221;, IEEE Transactions on Systems, Man and Cybernetics\u201dPart A: Systems and Humans, Vol. 40, No. 6, November 2010; pages 1345\u201c 1353.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem, I. Traore, &#8220;Detecting connection chains: a data mining approach&#8221;, International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Abdelhalim, I. Traore, &#8220;Identity application fraud detection using web mining and rule-based decision tree&#8221;, International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Simplot-Ryl, I. Traore, P. Everaere, &#8220;Distributed architectures for electronic cash schemes: a survey&#8221;, International Journal of Parallel, Emergent and Distributed Systems, accepted for publication in September 2008, (28 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem, I. Traore, &#8220;Detecting connection chains: a data mining approach&#8221;, to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Nazar, I. Traore, A.A.E. Ahmed, &#8220;Inverse biometrics for mouse dynamics&#8221;, International Journal of Artificial Intelligence and Pattern Recognition (IJPRAI), Volume 22, Issue 3, May 2008, pp. 461-495, (35 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu and I. Traore, &#8220;Unsupervised anomaly detection using an evolutionary extension of k-means algorithm&#8221;, International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Almulhem A. and I. Traore, &#8220;Profiling distributed connection chains&#8221;, International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Ahmed A.A.E , and I. Traore &#8220;A new biometrics technology based on mouse dynamics&#8221;, IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, July-September 2007, pp. 165-179, (15 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Y. Liu, I. Traore, &#8220;Properties for security measures of software products&#8221;, Applied Mathematics &amp; Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Lu, I. Traore, &#8220;A genetic EM algorithm for learning the optimal number of components of mixture models&#8221;, WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, D.B. Aredo, &#8220;Enhancing structured review with model-based verification&#8221;, IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Wei Lu, Issa Traore, &#8220;Detecting new forms of network intrusions using genetic programming&#8221;, Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA &amp; Oxford UK.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, D. B. Aredo, H. Ye, &#8220;An integrated framework for formal development of open distributed systems&#8221;, Information and Software Technology, Elsevier Science, Vol. 46, No. 5, pp. 281-286, April 2004.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Traore, &#8220;An outline of PVS semantics for UML statecharts&#8221;, Journal of Universal Computer Science (JUCS), Springer Pub. Co., Vol. 6, No. 11, pp. 1088-1108, Nov. 2000.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\"><\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">Romdhani, A. Jeoffroy, A.E.K. Sahraoui, I. Traore, &#8220;Integration of partial specification for airborne embedded systems&#8221;, European Journal of Automation, Vol. 31, No. 7, pp. 1221-1251, Nov. 1997.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: medium\">\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-size: medium\">\u00a0<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Glaucio H.S. Carvalho, Isaac Woungang, Alagan Anpalagan, and Issa Traore, \u201cAdmission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System\u201d, IEEE Systems Journal, October 2022, (in press), DOI: 10.1109\/JSYST.2022.3207019 W. A. Yousef, I. Traore and W. Briguglio, &#8220;Classifier Calibration: with application to threat scores in cybersecurity\u201d, IEEE Transactions on Dependable and Secure [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<ol><li>Abdulaziz Aldribi, Issa Traore, Belaid Moa, Onyekachi Nwamuo, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404819301907\">Hypervisor-Based Cloud Intrusion Detection through Online Multivariate Statistical Change Tracking<\/a>\u201d, Computers & Security, Elsevier, Volume 88, January 2020.<\/li><li>Brijesh Jethva, Issa Traor\u00e9, Asem Ghaleb, Karim Ganame, Sherif Ahmed, \u201c<a href=\"https:\/\/content.iospress.com\/articles\/journal-of-computer-security\/jcs191346\">Multilayer Ransomware Detection using Grouped Registry Key Operations, File Entropy and File Signature Monitoring<\/a>\u201d Journal of Computer Security, Volume 28, Number 3, 2020, pages 337-373.<\/li><li>Alhindi H., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S254266051930126X\">Preventing Data Leak through Semantic Analysis<\/a>\u201d, Journal of Internet of Things, Elsevier, 14 June 2019.<\/li><li>Alshahrani M., Traore I., and I. Woungang, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660519301556\">Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique<\/a>\u201d, Journal of Internet of Things, Elsevier, Volume 7, September 2019.<\/li><li>Alshahrani M., Traore I., \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212618306987\">Secure Mutual Authentication and Automated Access Control for IoT Smart Home using Cumulative Keyed-hash chain<\/a>\u201d, Journal of Information Security and Applications, Elsevier, Volume 45, April 2019, Pages 156-175.<\/li><li>Alshanketi F., Traore I., and A. Awad, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.48\">Multimodal Mobile Keystroke Dynamics Biometrics Combining Fixed and Variable passwords<\/a>\u201d, Journal of Security & Privacy, Wiley, Volume 2, Issue 1, January\/February 2019.<\/li><li>B. Sayed, I. Traore, A. Abdelhalim, \u201c<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167404818300397\">If-transpiler: Inlining of hybrid flow sensitive security monitor for JavaScript<\/a>\u201d, Journal of Computers & Security, Elsevier, 75 (2018) 92\u2013117.<\/li><li>Traore I., M. Alshaharani, M. Obaidat, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.44\">State of the Art and Perspectives on Traditional and Emerging Biometrics: A Survey<\/a>\u201d,\u00a0<em>Journal of Security and Privacy<\/em>, Wiley, Vol. 1 Issue 6, November\/December 2018.<\/li><li>Ahmed H, Traore I, Saad S., \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.9\">Detecting opinion spams and fake news using text classification<\/a>\u201d,\u00a0<em>Security and Privacy<\/em>, Wiley, Volume1, Issue1, January\/February 2018.<\/li><li>M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, \u201c<a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/dac.3259\">Authorship Verification Using Deep Belief Network Systems<\/a>\u201d, International Journal of Communication Systems, Wiley, Volume 30,\u00a0Issue 12, August 2017.<\/li><li>M. Brocardo, R. F. Custodio, C. R. De Rolt, J.D.S., and I. Traore, \u201cPrivacy Information in a Positive Credit System\u201d, International Journal of Grid and Utility Computing, Vol.8 No.1, pp.61 - 69, February 2017.<\/li><li>A. Kitana, I. Traore, I. Woungang, \u201c<a href=\"http:\/\/isyou.info\/jisis\/vol6\/no2\/jisis-2016-vol6-no2-01.pdf\">Impact Study of a Mobile Botnet over LTE Networks<\/a>\u201d, Journal of Internet Services and Information Security, Vol. 6, No. 2, pages 1-22, May 2016.<\/li><li>A. Abdelhalim and I. Traore, Y. Nakkabi, \u201cCreating decision trees from rules using RBDT-1\u201d,\u00a0<em>Computational Intelligence<\/em>, Volume 32, Issue 2, May 2016, Pages 216\u2013239, Wiley.<\/li><li>Alam, S.; Sogukpinar, I.; Traore, I; Horspool, N. R., \u201c<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11416-014-0222-y\">Sliding window of difference and control flow weight for metamorphic malware detection<\/a>\u201d,\u00a0<em>Journal of Computer Virology and Hacking Techniques<\/em>, Springer, May 2015,\u00a0Volume 11, Issue 2, pp 75\u201388.<\/li><li>S. Alam, R. N. Horspool, I. Traore, I. Sogukpinar, \u201cA framework for metamorphic malware analysis and real-time detection\u201d,\u00a0<em>Computers & Security<\/em>, Volume 48, February 2015, Pages 212\u2013233.S.<\/li><li>Alam, I. Traore, \u0130. So\u011fukp\u0131nar, \u201cAnnotated Control Flow Graph for Metamorphic Malware Detection\u201d.\u00a0<em>The Computer Journal<\/em>, Oxford Press, Volume 58 Issue 10 October 2015.<\/li><li>Marcelo Luiz Brocardo, Issa Traore, Isaac Woungang.\u00a0\"<a href=\"http:\/\/dx.doi.org\/10.1016\/j.jcss.2014.12.019\" target=\"_blank\" rel=\"noopener\">Authorship verification of e-mail and tweet messages applied for continuous authentication<\/a>\", Journal of Computer and System Sciences, Available online 29 December 2014, ISSN 0022-0000.<\/li><li>S. Moein, F. Gebali, I. Traore, \u201cAnalysis of Covert Hardware Attacks\u201d,\u00a0<em>Journal of Convergence<\/em>, Volume 5, Number 3, pp. 26-30, September 2014.<\/li><li>I. Traore, I. Woungang, M.S. Obaidat, Y. Nakkabi, and I. Lai, \u201c<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/Online%20risk-based%20authentication%20using%20behavioral%20biometrics.pdf\">Online Risk-based Authentication using Behavioral Biometrics<\/a>\u201d,\u00a0<em>Journal of Multimedia Tools and Applications<\/em>, Springer, July 2014, 71(2): 575-605.<\/li><li>Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, Isaac Woungang. \"<a href=\"http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/jnw091233473355\" target=\"_blank\" rel=\"noopener\">Verifying Online User Identity using Stylometric Analysis for Short Messages<\/a>\", Journal of Networks 9, no. 12 (2014): 3347-3355.<\/li><li>A.A.E, Ahmed, I. Traore, \"Free Text Recognition of Keystrokes\",\u00a0<em>IEEE Transactions on Cybernetics<\/em>, Vol. 44 No. 4, April 2014, pp. 458-472 (14 pages).<\/li><li>S. Saad, I. Traore, \u201cSemantic-aware Attack Scenario Reconstruction\u201d,\u00a0<em>Journal of Information Security and Applications<\/em>, Elsevier, Volume 18, Issue 1, July 2013, Pages 53\u201367.<\/li><li>D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani and D. Garant, \"Botnet Detection based on Traffic Behavior Analysis and Flow Intervals\", Computer & Security, Elsevier, vol. 39, 2013, pp. 2-16.<\/li><li>B. Sayed, I. Traore, I Woungang, M.S. Obaidat, \"Static Authentication based on Mouse Gestures\", IEEE Systems Journal, Vol. 7, No.2, June 2013, pages 262-274.<\/li><li>I. Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, and B. Khalilian, \"Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication\", IEEE Transactions on Systems, Man, and Cybernetics Part B, Vol. 42 No. 5, October 2012, pages 1343-1356.<\/li><li>S. Saad, I. Traore. \"Heterogeneous Multi-sensor IDS Alerts Aggregation using Semantic Analysis\", Journal of Information Assurance and Security (JIAS), Volume 7, No. 2, pages 78-87, June 2012.<\/li><li>S. Alharbi, B. Moa, J. H. Weber-Jahnke and I. Traore. \"<a href=\"http:\/\/iopscience.iop.org\/1742-6596\/385\/1\/012003\" target=\"_blank\" rel=\"noopener\">High Performance Proactive Digital Forensics<\/a>\". High Performance Computing Symposium (HPCS), Vancouver, 2012.<\/li><li>S. Alharbi, J. H. Weber-Jahnke, and I. Traore. \"<a href=\"https:\/\/www.uvic.ca\/ecs\/ece\/isot\/assets\/docs\/IJSIA.pdf\" target=\"_blank\" rel=\"noopener\">The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review<\/a>\". International Journal of Security and Its Applications, SERC, vol 5, no 4, 2011.<\/li><li>O. Hamdy, I. Traore, \"Homogenous physio-behavioral visual and mouse biometric\", ACM Transactions on Computer Human Interactions, Volume 18 Issue 3, July 2011.<\/li><li>I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, \"A framework for bottleneck analysis in high-performance software design\", Journal of Internet Technology (JIT), Vol. 13, No. 3, 2012.<\/li><li>I. Traore, I. Woungang, A.A.E. Hamed, M.S. Obaidat, \"Software performance modeling using the UML: a case study\", Journal of Networks (JNW), Academy Publisher, Vol. 7, No. 1, January 2012.<\/li><li>A. Hoole, I. Traore, I. Simplot-Ryl, \"Application of contract-based security assertion monitoring framework for telecommunications software engineering\", Mathematical and Computer Modeling Journal, Elsevier, Vol. 53, No.3-4, pp. 522-537, February 2011.<\/li><li>Y. Nakkabi, , I. Traore, A. A. E Ahmed, \"Improving mouse dynamics biometric performance using variance reduction with separate extractors\", IEEE Transactions on Systems, Man and Cybernetics\u201dPart A: Systems and Humans, Vol. 40, No. 6, November 2010; pages 1345\u201c 1353.<\/li><li>A. Almulhem, I. Traore, \"Detecting connection chains: a data mining approach\", International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/li><li>A. Abdelhalim, I. Traore, \"Identity application fraud detection using web mining and rule-based decision tree\", International Journal of Network and Computer Security, Vol. 1, No.1, pp. 31-44, October 2009.<\/li><li>I. Simplot-Ryl, I. Traore, P. Everaere, \"Distributed architectures for electronic cash schemes: a survey\", International Journal of Parallel, Emergent and Distributed Systems, accepted for publication in September 2008, (28 pages).<\/li><li>A. Almulhem, I. Traore, \"Detecting connection chains: a data mining approach\", to be published in International Journal of Network Security (IJNS), Vol. 10., No.1, pp. 62-74, Jan. 2010.<\/li><li>A. Nazar, I. Traore, A.A.E. Ahmed, \"Inverse biometrics for mouse dynamics\", International Journal of Artificial Intelligence and Pattern Recognition (IJPRAI), Volume 22, Issue 3, May 2008, pp. 461-495, (35 pages).<\/li><li>W. Lu and I. Traore, \"Unsupervised anomaly detection using an evolutionary extension of k-means algorithm\", International Journal on Information and Computer Security (IJICS), Volume 2, Issue 2, pp. 107-139, May-Aug 2008.<\/li><li>Almulhem A. and I. Traore, \"Profiling distributed connection chains\", International Journal of Communication Networks and Distributed Systems (IJCNDS), Volume 1, Issue 1, pp. 4-18, Jan-April 2008.<\/li><li>Ahmed A.A.E , and I. Traore \"A new biometrics technology based on mouse dynamics\", IEEE Transactions on Dependable and Secure Computing, Vol. 4 No. 3, July-September 2007, pp. 165-179, (15 pages).<\/li><li>M.Y. Liu, I. Traore, \"Properties for security measures of software products\", Applied Mathematics & Information Science (AMIS) Journal, 1 (2), pp.129-156 (28 pages), May 2007.<\/li><li>W. Lu, I. Traore, \"A genetic EM algorithm for learning the optimal number of components of mixture models\", WSEAS Transactions on Computers, Issue 9, Vol. 5, September 2006, pp. 1795-1803 (9 pages).<\/li><li>Traore, D.B. Aredo, \"Enhancing structured review with model-based verification\", IEEE Transactions on Software Engineering, Vol. 30, No. 11, P. 736-753.<\/li><li>Wei Lu, Issa Traore, \"Detecting new forms of network intrusions using genetic programming\", Computational Intelligence, Vol. 20, No. 3, pp. 475-494, Aug. 2004, Blackwell Publishing, Boston MA & Oxford UK.<\/li><li>I. Traore, D. B. Aredo, H. Ye, \"An integrated framework for formal development of open distributed systems\", Information and Software Technology, Elsevier Science, Vol. 46, No. 5, pp. 281-286, April 2004.<\/li><li>I. Traore, \"An outline of PVS semantics for UML statecharts\", Journal of Universal Computer Science (JUCS), Springer Pub. Co., Vol. 6, No. 11, pp. 1088-1108, Nov. 2000.<\/li><li>M. Romdhani, A. Jeoffroy, A.E.K. Sahraoui, I. Traore, \"Integration of partial specification for airborne embedded systems\", European Journal of Automation, Vol. 31, No. 7, pp. 1221-1251, Nov. 1997.<\/li><\/ol>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-562","post","type-post","status-publish","format-standard","hentry","category-complete-list","category-publications"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=562"}],"version-history":[{"count":15,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/562\/revisions"}],"predecessor-version":[{"id":1073,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/562\/revisions\/1073"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}