Skip to main content Skip to local navigation
Home » Publications

Publications

To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ To tackle the challenge of strengthening cybersecurity resiliency on a broader scale, it is vital to collaborate with the industry and use innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program at BCCC, we aim to gather, define, and convey fundamental knowledge and understanding to the general public in a manner that is clear, accessible, and inclusive. We aim to support the education and training of students, academics, researchers, developers, and industry professionals in IT systems and cybersecurity, recognizing that knowledge dissemination is a core component of Cyber Threat Intelligence (CTI). We contribute to building a more informed and resilient cybersecurity ecosystem by sharing actionable insights and understanding context-rich threats.

Understanding Cybersecurity Series (UCS) knowledge mobilization annual bulletins:

First Volume (Cybersecurity Month - 2025)

USC-Vol 2-2025 (PDF)

First Volume (Cybersecurity Month - 2024)

USC-Vol 1-2024 (PDF)

Articles


Toward Generating a Large-Scale IoT-Zwave Intrusion Detection Dataset: Smart Device Profiling, Intruders' Behaviour, and Traffic Characterization
Mohammad Moein Shafi and Arash Habibi Lashkari, The Journal of Internet of Things, Vol. 34, 2025 (Q1, IF=7.6)

A Novel Deep Learning-Based Vulnerability Detection in Smart Contracts Using Masked Attention and Control Flow Graph Analysis
Maƫlle Gautrina, Arash Habibi Lashkaria, and Sepideh HajiHosseinKhani, International Journal of Information Security, Vol. 24, #240, 2025 (Q2, IF=3.2)

CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network
Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, under review)


SCsVulSegLytix: Detecting and Extracting Vulnerable Segments from Smart Contracts Using Weakly-Supervised Learning
Borna Ahmadzadeha, Arousha Haghighian Roudsari, Sepideh HajiHosseinKhani and Arash Habibi Lashkari, Journal of Systems and Software, Vol. 231, 2025 (Q1, IF=4.1)

Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology

Yasin Dehfuli and Arash Habibi Lashkari, ACM Computing Surveys, Volume 58, Issue 4 (Q1, IF=28)

VADViT: Vision Transformer-Driven Memory Forensics for Malicious Process Detection and Explainable Threat Attribution
Yasin Dehfuli and Arash Habibi Lashkari, The Journal of Information Security and Applications, Vol. 94, 2025 (Q1, IF=3.7)


Unveiling Evasive Malware Behavior: Towards Generating a Multi-Sources Benchmark Dataset and Evasive Malware Behavior Profiling Using Network Traffic and Memory Analysis
Arash Habibi Lashkari, Mohammad Moein Shafi, Yongkun Li, Abhay Pratap Singh, Ashley Barkworth, The Journal of Supercomputing, Vol. 81, article number 782, 2025 (Q1, IF=2.5)

Advanced Genetic Algorithm and Penalty Fitness Function for Enhancing DeFi Security and Detecting Ethereum Fraud Transactions

Arash Habibi Lashkari, Sepideh Hajihosseinkhani, Joshua Duarte, Isabella Lopez, Ziba Habibi Lashkari, Sergio Rios-Aguilar, Blockchain: Research and Applications, 2025 (Q1, IF=5.6)

Hybrid attention-enhanced explainable model for encrypted traffic detection and classification

Adit Sharma, Arash Habibi Lashkari, International Journal of Information Security, Vol. 24, article number 144, 2025 (Q2, IF=2.4)


Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark Dataset

Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 6, Issue 2, 2025, 100253 (Q1, IF=2.5)

Toward Generating a Large-Scale Intrusion Detection Dataset and Intruders Behavioral Profiling using Network and Transportation Layers Traffic Flow Analyzer

Moein Shafi, Arash Habibi Lashkari, A.H. & Arousha Haghighian Roudsari, Journal of Netw System Management Vol. 33, 44, 2025 (Q1, IF=4.1)

A comprehensive survey of smart contracts vulnerability detection tools: Techniques and methodologies

Niosha Hejazi, Arash Habibi Lashkari, Journal of Network and Computer Applications, Vol. 237,
2025, 104142 (Q1, IF=7.7)


A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions

Adit Sharma, Arash Habibi Lashkari, Computer Networks, Vol. 257, February 2025, 110984 (Q1, IF=4.4)

NTLFlowLyzer: Toward generating an intrusion detection dataset and intruder behavior profiling through network layer traffic analysis and pattern extraction

MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computers & Security, 2024, 104160 (Q1, IF=5.6)

Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis

MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Vol. 118, Part B, 2024 (Q1, IF=4.0)


IoT malware: An attribute-based taxonomy, detection mechanisms, and challenges

Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023 (Q2, IF=4.2)

Unveiling DoH Tunnel: Toward Generating a Balanced DoH Encrypted Traffic Dataset and Profiling Malicious Behaviour using Inherently Interpretable Machine Learning

Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023 (Q2, IF=4.2)

Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset

Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4, 2023 (Q1, IF=2.5)


Robust stacking ensemble model for darknet traffic classification under adversarial settings

Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Habibi Lashkari, Computers & Security Journal, Vol. 120, 2022 (Q1, IF=5.6)

A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms, and challenges

Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, Vol. 2, Issue 6, 2023 (Q2, IF=2.2)

Detection, Characterization, and Profiling DOH Malicious Traffic Using Statistical Pattern Recognition

Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, 2023 (Q1, IF=3.22)