User profiles for Issa Traore
Issa TraoreProfessor, ECE Department, University of Victoria Verified email at ece.uvic.ca Cited by 7292 |
A new biometric technology based on mouse dynamics
In this paper, we introduce a new form of behavioral biometrics based on mouse dynamics,
which can be used in different security applications. We develop a technique that can be …
which can be used in different security applications. We develop a technique that can be …
Detection of online fake news using n-gram analysis and machine learning techniques
Fake news is a phenomenon which is having a significant impact on our social life, in particular
in the political world. Fake news detection is an emerging research area which is gaining …
in the political world. Fake news detection is an emerging research area which is gaining …
Botnet detection based on traffic behavior analysis and flow intervals
Botnets represent one of the most serious cybersecurity threats faced by organizations today.
Botnets have been used as the main vector in carrying many cyber crimes reported in the …
Botnets have been used as the main vector in carrying many cyber crimes reported in the …
Detecting opinion spams and fake news using text classification
In recent years, deceptive content such as fake news and fake reviews, also known as opinion
spams, have increasingly become a dangerous prospect for online users. Fake reviews …
spams, have increasingly become a dangerous prospect for online users. Fake reviews …
Detecting P2P botnets through network behavior analysis and machine learning
Botnets have become one of the major threats on the Internet for serving as a vector for
carrying attacks against organizations and committing cybercrimes. They are used to generate …
carrying attacks against organizations and committing cybercrimes. They are used to generate …
Detecting new forms of network intrusion using genetic programming
How to find and detect novel or unknown network attacks is one of the most important objectives
in current intrusion detection systems. In this paper, a rule evolution approach based on …
in current intrusion detection systems. In this paper, a rule evolution approach based on …
[HTML][HTML] A survey on IoT-enabled smart grids: Emerging, applications, challenges, and outlook
Swift population growth and rising demand for energy in the 21st century have resulted in
considerable efforts to make the electrical grid more intelligent and responsive to …
considerable efforts to make the electrical grid more intelligent and responsive to …
[HTML][HTML] False-negative rapid diagnostic tests for malaria and deletion of the histidine-rich repeat region of the hrp2 gene
…, SN Doumbo, A Dolo, A Tounkara, I Traoré… - The American journal …, 2012 - ncbi.nlm.nih.gov
We identified 480 persons with positive thick smears for asexual Plasmodium falciparum
parasites, of whom 454 had positive rapid diagnostic tests (RDTs) for the histidine-rich protein 2 …
parasites, of whom 454 had positive rapid diagnostic tests (RDTs) for the histidine-rich protein 2 …
Biometric recognition based on free-text keystroke dynamics
Accurate recognition of free text keystroke dynamics is challenging due to the unstructured
and sparse nature of the data and its underlying variability. As a result, most of the …
and sparse nature of the data and its underlying variability. As a result, most of the …
[BOOK][B] Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics
I Traore - 2011 - books.google.com
User authentication is the process of verifying whether the identity of a user is genuine prior
to granting him or her access to resources or services in a secured environment. Traditionally…
to granting him or her access to resources or services in a secured environment. Traditionally…