Search Results - "Traore, Issa"

Refine Results
  1. 1

    A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook by Goudarzi, Arman, Ghayoor, Farzad, Waseem, Muhammad, Fahad, Shah, Traore, Issa

    Published in Energies (Basel) (01-10-2022)
    “…Swift population growth and rising demand for energy in the 21st century have resulted in considerable efforts to make the electrical grid more intelligent and…”
    Get full text
    Journal Article
  2. 2

    Detecting opinion spams and fake news using text classification by Ahmed, Hadeer, Traore, Issa, Saad, Sherif

    Published in Security and privacy (01-01-2018)
    “…In recent years, deceptive content such as fake news and fake reviews, also known as opinion spams, have increasingly become a dangerous prospect for online…”
    Get full text
    Journal Article
  3. 3

    Botnet detection based on traffic behavior analysis and flow intervals by Zhao, David, Traore, Issa, Sayed, Bassam, Lu, Wei, Saad, Sherif, Ghorbani, Ali, Garant, Dan

    Published in Computers & security (01-11-2013)
    “…Botnets represent one of the most serious cybersecurity threats faced by organizations today. Botnets have been used as the main vector in carrying many cyber…”
    Get full text
    Journal Article
  4. 4

    SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place by Nandikotkur, Achyuth, Traore, Issa, Mamun, Mohammad

    Published in Sensors (Basel, Switzerland) (28-07-2023)
    “…With the ever-growing reliance on IoT-enabled sensors to age in place, a need arises to protect them from malicious actors and detect malfunctions. In an IoT…”
    Get full text
    Journal Article
  5. 5

    Authorship verification of e-mail and tweet messages applied for continuous authentication by Brocardo, Marcelo Luiz, Traore, Issa, Woungang, Isaac

    Published in Journal of computer and system sciences (01-12-2015)
    “…Authorship verification using stylometry consists of identifying a user based on his writing style. In this paper, authorship verification is applied for…”
    Get full text
    Journal Article
  6. 6

    Text augmentation using a graph-based approach and clonal selection algorithm by Ahmed, Hadeer, Traore, Issa, Mamun, Mohammad, Saad, Sherif

    Published in Machine learning with applications (15-03-2023)
    “…Annotated data is critical for machine learning models, but producing large amounts of data with high-quality labeling is a time-consuming and labor-intensive…”
    Get full text
    Journal Article
  7. 7

    A framework for metamorphic malware analysis and real-time detection by Alam, Shahid, Horspool, R.Nigel, Traore, Issa, Sogukpinar, Ibrahim

    Published in Computers & security (01-02-2015)
    “…Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general…”
    Get full text
    Journal Article
  8. 8

    When Agile Security Meets 5G by Carvalho, Glaucio H. S., Woungang, Isaac, Anpalagan, Alagan, Traore, Issa

    Published in IEEE access (2020)
    “…5G is a critical infrastructure that will connect the whole society and bridge other critical infrastructure systems. Thus, cybersecurity emerges as crucial…”
    Get full text
    Journal Article
  9. 9

    Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking by Aldribi, Abdulaziz, Traoré, Issa, Moa, Belaid, Nwamuo, Onyekachi

    Published in Computers & security (01-01-2020)
    “…Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making intrusion detection more challenging. This paper introduces a new…”
    Get full text
    Journal Article
  10. 10

    Factors influencing maize production in Sikasso Region of Mali by Yassoungo, Traore Issa, Olarewaju, Aminu Oluwafunmilayo, Emmanuel, Adekoya Adegbenga

    Published in Journal of agricultural extension (01-10-2018)
    “…In recent times, there has been decline in maize production in Mali due to several factors; one of which is that of access to inputs such as fertilizer and…”
    Get full text
    Journal Article
  11. 11

    Detecting New Forms of Network Intrusion Using Genetic Programming by Lu, Wei, Traore, Issa

    Published in Computational intelligence (01-08-2004)
    “…How to find and detect novel or unknown network attacks is one of the most important objectives in current intrusion detection systems. In this paper, a rule…”
    Get full text
    Journal Article
  12. 12

    E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks by Harishankar, Ssowjanya, Woungang, Isaac, Dhurandher, Sanjay Kumar, Traore, Issa, Kaleel, Shakira Banu

    “…In mobile ad hoc networks (MANETs), nodes are mobile and have limited energy resource that can quickly deplete due to multi-hop routing activities, which may…”
    Get full text
    Conference Proceeding Journal Article
  13. 13

    Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain by Alshahrani, Mohammed, Traore, Issa

    “…IoT platforms face huge challenge in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have…”
    Get full text
    Journal Article
  14. 14

    Machine learning in precision medicine to preserve privacy via encryption by Briguglio, William, Moghaddam, Parisa, Yousef, Waleed A., Traoré, Issa, Mamun, Mohammad

    Published in Pattern recognition letters (01-11-2021)
    “…•Proposing a generic machine learning with encryption (MLE) framework.•Building an ML model that predicts cancer from one of the most recent genomics…”
    Get full text
    Journal Article
  15. 15
  16. 16

    UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring by Yousef, Waleed A., Traore, Issa, Briguglio, William

    “…The visualization and detection of anomalies (outliers) are of crucial importance to many fields, particularly cybersecurity. Several approaches have been…”
    Get full text
    Journal Article
  17. 17

    Classifier Calibration: With Application to Threat Scores in Cybersecurity by Yousef, Waleed A., Traore, Issa, Briguglio, William

    “…This article explores the calibration of a classifier output score in binary classification problems. A calibrator is a function that maps the arbitrary…”
    Get full text
    Journal Article
  18. 18

    If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript by Sayed, Bassam, Traoré, Issa, Abdelhalim, Amany

    Published in Computers & security (01-06-2018)
    “…A key characteristic of modern web applications is their heavy reliance on client-side JavaScript libraries. They use the libraries to achieve interactivity,…”
    Get full text
    Journal Article
  19. 19

    Rapid antiretroviral therapy initiation and its effect on treatment response in MSM in West Africa by Dah, Ter Tiero Elias, Yaya, Issifou, Mensah, Ephrem, Coulibaly, Alou, Kouamé, Jean-Baptiste Malan, Traoré, Issa, Mora, Marion, Palvadeau, Paméla, Anoma, Camille, Keita, Bintou Dembélé, Spire, Bruno, Laurent, Christian

    Published in AIDS (London) (01-11-2021)
    “…To assess the time from HIV diagnosis to ART initiation and the effect of rapid ART initiation (i.e. within 7 days of HIV diagnosis) on attrition and virologic…”
    Get full text
    Journal Article
  20. 20

    A Framework for Synthetic Agetech Attack Data Generation by Khaemba, Noel, Traoré, Issa, Mamun, Mohammad

    Published in Journal of cybersecurity and privacy (01-12-2023)
    “…To address the lack of datasets for agetech, this paper presents an approach for generating synthetic datasets that include traces of benign and attack…”
    Get full text
    Journal Article