| 2008 |
| 20 | EE | Wei Lu,
Hengjian Tong,
Issa Traoré:
E-Means: An Evolutionary Clustering Algorithm.
ISICA 2008: 537-545 |
| 19 | EE | Akif Nazar,
Issa Traoré,
Ahmed Awad E. Ahmed:
Inverse Biometrics for mouse Dynamics.
IJPRAI 22(3): 461-495 (2008) |
| 2007 |
| 18 | EE | Yanguo Liu,
Issa Traoré:
Systematic Security Analysis for Service-Oriented Software Architectures.
ICEBE 2007: 612-621 |
| 17 | EE | Ahmed Awad E. Ahmed,
Issa Traoré:
A New Biometric Technology Based on Mouse Dynamics.
IEEE Trans. Dependable Sec. Comput. 4(3): 165-179 (2007) |
| 2006 |
| 16 | EE | Michael Yanguo Liu,
Issa Traoré:
Empirical relation between coupling and attackability in software systems: : a case study on DOS.
PLAS 2006: 57-64 |
| 2005 |
| 15 | EE | Wei Lu,
Issa Traoré:
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time.
CANS 2005: 96-109 |
| 14 | | Wei Lu,
Issa Traoré:
A New Evolutionary Algorithm for Determining the Optimal Number of Clusters.
CIMCA/IAWTIC 2005: 648-653 |
| 13 | EE | Suraiya Khan,
Issa Traoré:
A Prevention Model for Algorithmic Complexity Attacks.
DIMVA 2005: 160-173 |
| 12 | EE | Ahmad Almulhem,
Issa Traoré:
Experience with Engineering a Network Forensics System.
ICOIN 2005: 62-71 |
| 11 | EE | Wei Lu,
Issa Traoré:
Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm.
ICTAI 2005: 712-713 |
| 10 | EE | Michael Yanguo Liu,
Issa Traoré:
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis.
IEEE METRICS 2005: 10 |
| 9 | EE | Ahmed Awad E. Ahmed,
Issa Traoré:
Detecting Computer Intrusions Using Behavioral Biometrics.
PST 2005 |
| 2004 |
| 8 | EE | Issa Traoré,
Demissie B. Aredo:
Enhancing Structured Review with Model-Based Verification.
IEEE Trans. Software Eng. 30(11): 736-753 (2004) |
| 7 | EE | Issa Traoré,
Demissie B. Aredo,
Hong Ye:
An integrated framework for formal development of open distributed systems.
Information & Software Technology 46(5): 281-286 (2004) |
| 2003 |
| 6 | | Issa Traoré:
A Transition-based Strategy for Object-oriented Software Testing.
SAC 2003: 1055-1062 |
| 5 | | Issa Traoré,
Demissie B. Aredo,
Hong Ye:
An Integrated Framework for Formal Development of Open Distributed Systems.
SAC 2003: 1078-1085 |
| 4 | | Issa Traoré,
Suraiya Khan:
A Protection Scheme for Collaborative Environments.
SAC 2003: 331-337 |
| 2002 |
| 3 | EE | Alexander Hoole,
Issa Traoré,
Michael Yanguo Liu:
Formal Analysis of an Agent-Based Medical Diagnosis Confirmation System: (Extended Abstract).
FAABS 2002: 292-293 |
| 2001 |
| 2 | EE | Issa Traoré:
An Integrated V&V Environment for Critical Systems Development.
RE 2001: 287 |
| 2000 |
| 1 | EE | Issa Traoré:
An Outline of PVS Semantics for UML Statecharts.
J. UCS 6(11): 1088-1108 (2000) |