Issa Traore

Issa Traore obtained a PhD in Software Engineering in 1998 from Institute Nationale Polytechnique (INPT)-LAAS/CNRS, Toulouse, France. He has been with the faculty of the Department of Electrical and Computer Engineering of the University of Victoria since 1999. He is currently an Associate Professor and the Coordinator of the Information Security and Object Technology (ISOT) Lab (http://www.isot.ece.uvic.ca) at the University of Victoria. His research interests include biometrics technologies, computer intrusion detection, network forensics, software security, and software quality engineering. He has published over 90 technical papers in computer security and software engineering and supervised 23 Master and PhD graduate students in the last 10 years. He is currently serving as Associate Editor for the International Journal of Communication Networks and Distributed Systems (IJCNDS). Dr. Traore is also a co-founder and CEO of Plurilock Security Solutions Inc. (http://www.plurilock.com), a network security company which provides innovative authentication technologies, and is one of the pioneers in bringing continuous authentication products to the market.

Publications

Software Security Engineering – Part I: Security Requirements and Risk Analysis
Issa Traore, Isaac Woungang. © 2015. 36 pages.
It has been reported in the literature that about twenty new software vulnerabilities are reported weekly. This situation has increased the security awareness in the software...
Software Security Engineering – Part II: Security Policy, Analysis, and Design
Issa Traore, Isaac Woungang. © 2015. 30 pages.
This chapter explains the major objectives of a security policy, with focus on how applications that can protect data at all access points can be developed. Access control models...
Software Security Engineering – Part I: Security Requirements and Risk Analysis
Issa Traore, Isaac Woungang. © 2013. 35 pages.
It has been reported in the literature that about twenty new software vulnerabilities are reported weekly. This situation has increased the security awareness in the software...
Software Security Engineering – Part II: Security Policy, Analysis, and Design
Issa Traore, Isaac Woungang. © 2013. 29 pages.
This chapter explains the major objectives of a security policy, with focus on how applications that can protect data at all access points can be developed. Access control models...
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Issa Traore, Ahmed Awad E. Ahmed. © 2012. 294 pages.
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment....
Mouse Dynamics Biometric Technology
Ahmed Awad E. Ahmed, Issa Traore. © 2010. 17 pages.
In this chapter the Authors introduce the concepts behind the mouse dynamics biometric technology, present a generic architecture of the detector used to collect and process...