User profiles for Issa Traore

Issa Traore

Professor, ECE Department, University of Victoria
Verified email at ece.uvic.ca
Cited by 7292

A new biometric technology based on mouse dynamics

AAE Ahmed, I Traore - IEEE Transactions on dependable and …, 2007 - ieeexplore.ieee.org
In this paper, we introduce a new form of behavioral biometrics based on mouse dynamics,
which can be used in different security applications. We develop a technique that can be …

Detection of online fake news using n-gram analysis and machine learning techniques

H Ahmed, I Traore, S Saad - … , and Dependable Systems in Distributed and …, 2017 - Springer
Fake news is a phenomenon which is having a significant impact on our social life, in particular
in the political world. Fake news detection is an emerging research area which is gaining …

Botnet detection based on traffic behavior analysis and flow intervals

D Zhao, I Traore, B Sayed, W Lu, S Saad, A Ghorbani… - computers & …, 2013 - Elsevier
Botnets represent one of the most serious cybersecurity threats faced by organizations today.
Botnets have been used as the main vector in carrying many cyber crimes reported in the …

Detecting opinion spams and fake news using text classification

H Ahmed, I Traore, S Saad - Security and Privacy, 2018 - Wiley Online Library
In recent years, deceptive content such as fake news and fake reviews, also known as opinion
spams, have increasingly become a dangerous prospect for online users. Fake reviews …

Detecting P2P botnets through network behavior analysis and machine learning

S Saad, I Traore, A Ghorbani, B Sayed… - 2011 Ninth annual …, 2011 - ieeexplore.ieee.org
Botnets have become one of the major threats on the Internet for serving as a vector for
carrying attacks against organizations and committing cybercrimes. They are used to generate …

Detecting new forms of network intrusion using genetic programming

W Lu, I Traore - Computational intelligence, 2004 - Wiley Online Library
How to find and detect novel or unknown network attacks is one of the most important objectives
in current intrusion detection systems. In this paper, a rule evolution approach based on …

[HTML][HTML] A survey on IoT-enabled smart grids: Emerging, applications, challenges, and outlook

A Goudarzi, F Ghayoor, M Waseem, S Fahad, I Traore - Energies, 2022 - mdpi.com
Swift population growth and rising demand for energy in the 21st century have resulted in
considerable efforts to make the electrical grid more intelligent and responsive to …

[HTML][HTML] False-negative rapid diagnostic tests for malaria and deletion of the histidine-rich repeat region of the hrp2 gene

…, SN Doumbo, A Dolo, A Tounkara, I Traoré… - The American journal …, 2012 - ncbi.nlm.nih.gov
We identified 480 persons with positive thick smears for asexual Plasmodium falciparum
parasites, of whom 454 had positive rapid diagnostic tests (RDTs) for the histidine-rich protein 2 …

Biometric recognition based on free-text keystroke dynamics

AA Ahmed, I Traore - IEEE transactions on cybernetics, 2013 - ieeexplore.ieee.org
Accurate recognition of free text keystroke dynamics is challenging due to the unstructured
and sparse nature of the data and its underlying variability. As a result, most of the …

[BOOK][B] Continuous Authentication Using Biometrics: Data, Models, and Metrics: Data, Models, and Metrics

I Traore - 2011 - books.google.com
User authentication is the process of verifying whether the identity of a user is genuine prior
to granting him or her access to resources or services in a secured environment. Traditionally…