The SCEAS System
Navigation Menu

Search the dblp DataBase


Issa Traoré: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wei Lu, Issa Traoré
    A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:96-109 [Conf]
  2. Suraiya Khan, Issa Traoré
    A Prevention Model for Algorithmic Complexity Attacks. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2005, pp:160-173 [Conf]
  3. Alexander Hoole, Issa Traoré, Michael Yanguo Liu
    Formal Analysis of an Agent-Based Medical Diagnosis Confirmation System: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    FAABS, 2002, pp:292-293 [Conf]
  4. Ahmad Almulhem, Issa Traoré
    Experience with Engineering a Network Forensics System. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:62-71 [Conf]
  5. Wei Lu, Issa Traoré
    Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2005, pp:712-713 [Conf]
  6. Michael Yanguo Liu, Issa Traoré
    Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 2005, pp:10- [Conf]
  7. Ahmed Awad E. Ahmed, Issa Traoré
    Detecting Computer Intrusions Using Behavioral Biometrics. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  8. Issa Traoré
    An Integrated V&V Environment for Critical Systems Development. [Citation Graph (0, 0)][DBLP]
    RE, 2001, pp:287- [Conf]
  9. Issa Traoré
    A Transition-based Strategy for Object-oriented Software Testing. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:1055-1062 [Conf]
  10. Issa Traoré, Suraiya Khan
    A Protection Scheme for Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:331-337 [Conf]
  11. Issa Traoré, Demissie B. Aredo, Hong Ye
    An Integrated Framework for Formal Development of Open Distributed Systems. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:1078-1085 [Conf]
  12. Wei Lu, Issa Traoré
    A New Evolutionary Algorithm for Determining the Optimal Number of Clusters. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:648-653 [Conf]
  13. Issa Traoré, Demissie B. Aredo, Hong Ye
    An integrated framework for formal development of open distributed systems. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:5, pp:281-286 [Journal]
  14. Issa Traoré
    An Outline of PVS Semantics for UML Statecharts. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2000, v:6, n:11, pp:1088-1108 [Journal]
  15. Issa Traoré, Demissie B. Aredo
    Enhancing Structured Review with Model-Based Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2004, v:30, n:11, pp:736-753 [Journal]
  16. Ahmed Awad E. Ahmed, Issa Traoré
    A New Biometric Technology Based on Mouse Dynamics. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:165-179 [Journal]

  17. Systematic Security Analysis for Service-Oriented Software Architectures. [Citation Graph (, )][DBLP]

  18. Integrated Security Verification and Validation: Case Study. [Citation Graph (, )][DBLP]

  19. Empirical relation between coupling and attackability in software systems: : a case study on DOS. [Citation Graph (, )][DBLP]

  20. E-Means: An Evolutionary Clustering Algorithm. [Citation Graph (, )][DBLP]

  21. Contract-Based Security Monitors for Service Oriented Software Architecture. [Citation Graph (, )][DBLP]

  22. A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures. [Citation Graph (, )][DBLP]

  23. Detecting New Forms of Network Intrusion Using Genetic Programming. [Citation Graph (, )][DBLP]

Search in 0.015secs, Finished in 0.016secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002