Search Results - "Traore, Issa"
-
1
A Survey on IoT-Enabled Smart Grids: Emerging, Applications, Challenges, and Outlook
Published in Energies (Basel) (01-10-2022)“…Swift population growth and rising demand for energy in the 21st century have resulted in considerable efforts to make the electrical grid more intelligent and…”
Get full text
Journal Article -
2
Detecting opinion spams and fake news using text classification
Published in Security and privacy (01-01-2018)“…In recent years, deceptive content such as fake news and fake reviews, also known as opinion spams, have increasingly become a dangerous prospect for online…”
Get full text
Journal Article -
3
Botnet detection based on traffic behavior analysis and flow intervals
Published in Computers & security (01-11-2013)“…Botnets represent one of the most serious cybersecurity threats faced by organizations today. Botnets have been used as the main vector in carrying many cyber…”
Get full text
Journal Article -
4
SeniorSentry: Correlation and Mutual Information-Based Contextual Anomaly Detection for Aging in Place
Published in Sensors (Basel, Switzerland) (28-07-2023)“…With the ever-growing reliance on IoT-enabled sensors to age in place, a need arises to protect them from malicious actors and detect malfunctions. In an IoT…”
Get full text
Journal Article -
5
Authorship verification of e-mail and tweet messages applied for continuous authentication
Published in Journal of computer and system sciences (01-12-2015)“…Authorship verification using stylometry consists of identifying a user based on his writing style. In this paper, authorship verification is applied for…”
Get full text
Journal Article -
6
Text augmentation using a graph-based approach and clonal selection algorithm
Published in Machine learning with applications (15-03-2023)“…Annotated data is critical for machine learning models, but producing large amounts of data with high-quality labeling is a time-consuming and labor-intensive…”
Get full text
Journal Article -
7
A framework for metamorphic malware analysis and real-time detection
Published in Computers & security (01-02-2015)“…Metamorphism is a technique that mutates the binary code using different obfuscations. It is difficult to write a new metamorphic malware and in general…”
Get full text
Journal Article -
8
When Agile Security Meets 5G
Published in IEEE access (2020)“…5G is a critical infrastructure that will connect the whole society and bridge other critical infrastructure systems. Thus, cybersecurity emerges as crucial…”
Get full text
Journal Article -
9
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking
Published in Computers & security (01-01-2020)“…Cloud computing is facing a multidimensional and rapidly evolving threat landscape, making intrusion detection more challenging. This paper introduces a new…”
Get full text
Journal Article -
10
Factors influencing maize production in Sikasso Region of Mali
Published in Journal of agricultural extension (01-10-2018)“…In recent times, there has been decline in maize production in Mali due to several factors; one of which is that of access to inputs such as fertilizer and…”
Get full text
Journal Article -
11
Detecting New Forms of Network Intrusion Using Genetic Programming
Published in Computational intelligence (01-08-2004)“…How to find and detect novel or unknown network attacks is one of the most important objectives in current intrusion detection systems. In this paper, a rule…”
Get full text
Journal Article -
12
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks
Published in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (01-03-2015)“…In mobile ad hoc networks (MANETs), nodes are mobile and have limited energy resource that can quickly deplete due to multi-hop routing activities, which may…”
Get full text
Conference Proceeding Journal Article -
13
Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
Published in Journal of information security and applications (01-04-2019)“…IoT platforms face huge challenge in deploying robust authentication mechanisms due to the fact that edge devices and resource-constrained devices may not have…”
Get full text
Journal Article -
14
Machine learning in precision medicine to preserve privacy via encryption
Published in Pattern recognition letters (01-11-2021)“…•Proposing a generic machine learning with encryption (MLE) framework.•Building an ML model that predicts cancer from one of the most recent genomics…”
Get full text
Journal Article -
15
False-Negative Rapid Diagnostic Tests for Malaria and Deletion of the Histidine-Rich Repeat Region of the hrp2 Gene
Published in The American journal of tropical medicine and hygiene (01-02-2012)“…We identified 480 persons with positive thick smears for asexual Plasmodium falciparum parasites, of whom 454 had positive rapid diagnostic tests (RDTs) for…”
Get full text
Journal Article -
16
UN-AVOIDS: Unsupervised and Nonparametric Approach for Visualizing Outliers and Invariant Detection Scoring
Published in IEEE transactions on information forensics and security (2021)“…The visualization and detection of anomalies (outliers) are of crucial importance to many fields, particularly cybersecurity. Several approaches have been…”
Get full text
Journal Article -
17
Classifier Calibration: With Application to Threat Scores in Cybersecurity
Published in IEEE transactions on dependable and secure computing (01-05-2023)“…This article explores the calibration of a classifier output score in binary classification problems. A calibrator is a function that maps the arbitrary…”
Get full text
Journal Article -
18
If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript
Published in Computers & security (01-06-2018)“…A key characteristic of modern web applications is their heavy reliance on client-side JavaScript libraries. They use the libraries to achieve interactivity,…”
Get full text
Journal Article -
19
Rapid antiretroviral therapy initiation and its effect on treatment response in MSM in West Africa
Published in AIDS (London) (01-11-2021)“…To assess the time from HIV diagnosis to ART initiation and the effect of rapid ART initiation (i.e. within 7 days of HIV diagnosis) on attrition and virologic…”
Get full text
Journal Article -
20
A Framework for Synthetic Agetech Attack Data Generation
Published in Journal of cybersecurity and privacy (01-12-2023)“…To address the lack of datasets for agetech, this paper presents an approach for generating synthetic datasets that include traces of benign and attack…”
Get full text
Journal Article