Name
Affiliation
Papers
ISSA TRAORE
Department of Electrical and Computer Engineering, STN CSC, University of Victoria, Victoria, B.C., Canada
60
Collaborators
Citations 
PageRank 
68
306
32.31
Referers 
Referees 
References 
723
1113
603
Search Limit
1001000
Title
Citations
PageRank
Year
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks10.402021
Preventing Data Leak through Semantic Analysis00.342021
Malware Detection Using Machine Learning Models00.342020
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking10.362020
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing00.342020
Towards an Epidemic SMS-based Cellular Botnet.00.342020
Secure remote anonymous user authentication scheme for smart home environment20.362020
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique10.352019
A Framework Architecture for Agentless Cloud Endpoint Security Monitoring00.342019
Lightweight IoT Mutual Authentication Scheme Based on Transient Identities and Transactions History.00.342019
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain.40.452019
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT)00.342019
Privacy information in a positive credit system.10.352017
Authorship Verification Using Deep Belief Network Systems50.512017
Creating Decision Trees from Rules using RBDT‐100.342016
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network00.342016
Improving vulnerability detection measurement: [test suites and software security assurance].10.352016
SMS Botnet Detection for Android Devices through Intent Capture and Modeling10.362015
Sharing Privacy Information in Credit Analysis Environment00.342015
A Game Theoretic Framework for Cloud Security Transparency.00.342015
Cloud Slicing a new architecture for cloud security monitoring00.342015
Sliding window and control flow weight for metamorphic malware detection.70.442015
Authorship verification of e-mail and tweet messages applied for continuous authentication120.592015
Detection and mitigation of malicious JavaScript using information flow control10.372014
In-Cloud Malware Analysis and Detection: State of the Art10.372014
MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection100.552014
Toward a Framework for Continuous Authentication Using Stylometry60.442014
Current Trends and the Future of Metamorphic Malware Detection10.352014
Continuous authentication using micro-messages00.342014
MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection110.552013
A Timed And Secured Monitoring Implementation Against Wormhole Attacks In Aodv-Based Mobile Ad Hoc Networks10.372013
Authorship verification for short messages using stylometry220.852013
P2P Botnet Detection through Malicious Fast Flux Network Identification10.352012
Extracting attack scenarios using intrusion semantics30.402012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication40.442012
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks40.482012
Editorial: Adaptive Communication in Wireless Networks10.342011
Dynamic sample size detection in continuous authentication using sequential sampling60.462011
Application of contract-based security assertion monitoring framework for telecommunications software engineering10.342011
New Physiological Biometrics Based on Human Cognitive Factors10.372009
A New Method for Learning Decision Trees from Rules40.792009
RBDT-1: A New Rule-Based Decision Tree Generation Technique20.442009
Distributed architectures for electronic cash schemes: a survey50.492009
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures70.602008
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm.30.422008
Contract-Based Security Monitors for Service Oriented Software Architecture10.362008
E-Means: An Evolutionary Clustering Algorithm00.342008
Systematic Security Analysis for Service-Oriented Software Architectures20.442007
Mining and Detecting Connection-Chains in Network Traffic.20.382007
A New Biometric Technology Based on Mouse Dynamics1215.462007
  • 1
  • 2