Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Sedlak, M.
Hao Mao
Peter Malec
Markus Eurich
Shaoli Liu
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
ISSA TRAORE
Author Info
Open Visualization
Name
Affiliation
Papers
ISSA TRAORE
Department of Electrical and Computer Engineering, STN CSC, University of Victoria, Victoria, B.C., Canada
60
Collaborators
Citations
PageRank
68
306
32.31
Referers
Referees
References
723
1113
603
Search Limit
100
1000
Publications (60 rows)
Collaborators (68 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks
1
0.40
2021
Preventing Data Leak through Semantic Analysis
0
0.34
2021
Malware Detection Using Machine Learning Models
0
0.34
2020
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
1
0.36
2020
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing
0
0.34
2020
Towards an Epidemic SMS-based Cellular Botnet.
0
0.34
2020
Secure remote anonymous user authentication scheme for smart home environment
2
0.36
2020
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique
1
0.35
2019
A Framework Architecture for Agentless Cloud Endpoint Security Monitoring
0
0.34
2019
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.
0
0.34
2019
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.
4
0.45
2019
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT)
0
0.34
2019
Privacy information in a positive credit system.
1
0.35
2017
Authorship Verification Using Deep Belief Network Systems
5
0.51
2017
Creating Decision Trees from Rules using RBDT‐1
0
0.34
2016
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network
0
0.34
2016
Improving vulnerability detection measurement: [test suites and software security assurance].
1
0.35
2016
SMS Botnet Detection for Android Devices through Intent Capture and Modeling
1
0.36
2015
Sharing Privacy Information in Credit Analysis Environment
0
0.34
2015
A Game Theoretic Framework for Cloud Security Transparency.
0
0.34
2015
Cloud Slicing a new architecture for cloud security monitoring
0
0.34
2015
Sliding window and control flow weight for metamorphic malware detection.
7
0.44
2015
Authorship verification of e-mail and tweet messages applied for continuous authentication
12
0.59
2015
Detection and mitigation of malicious JavaScript using information flow control
1
0.37
2014
In-Cloud Malware Analysis and Detection: State of the Art
1
0.37
2014
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection
10
0.55
2014
Toward a Framework for Continuous Authentication Using Stylometry
6
0.44
2014
Current Trends and the Future of Metamorphic Malware Detection
1
0.35
2014
Continuous authentication using micro-messages
0
0.34
2014
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection
11
0.55
2013
A Timed And Secured Monitoring Implementation Against Wormhole Attacks In Aodv-Based Mobile Ad Hoc Networks
1
0.37
2013
Authorship verification for short messages using stylometry
22
0.85
2013
P2P Botnet Detection through Malicious Fast Flux Network Identification
1
0.35
2012
Extracting attack scenarios using intrusion semantics
3
0.40
2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication
4
0.44
2012
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks
4
0.48
2012
Editorial: Adaptive Communication in Wireless Networks
1
0.34
2011
Dynamic sample size detection in continuous authentication using sequential sampling
6
0.46
2011
Application of contract-based security assertion monitoring framework for telecommunications software engineering
1
0.34
2011
New Physiological Biometrics Based on Human Cognitive Factors
1
0.37
2009
A New Method for Learning Decision Trees from Rules
4
0.79
2009
RBDT-1: A New Rule-Based Decision Tree Generation Technique
2
0.44
2009
Distributed architectures for electronic cash schemes: a survey
5
0.49
2009
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
7
0.60
2008
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm.
3
0.42
2008
Contract-Based Security Monitors for Service Oriented Software Architecture
1
0.36
2008
E-Means: An Evolutionary Clustering Algorithm
0
0.34
2008
Systematic Security Analysis for Service-Oriented Software Architectures
2
0.44
2007
Mining and Detecting Connection-Chains in Network Traffic.
2
0.38
2007
A New Biometric Technology Based on Mouse Dynamics
121
5.46
2007
1
2
50 / page