To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ To tackle the challenge of strengthening cybersecurity resiliency on a broader scale, it is vital to collaborate with the industry and use innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program at BCCC, we aim to gather, define, and convey fundamental knowledge and understanding to the general public in a manner that is clear, accessible, and inclusive. We aim to support the education and training of students, academics, researchers, developers, and industry professionals in IT systems and cybersecurity, recognizing that knowledge dissemination is a core component of Cyber Threat Intelligence (CTI). We contribute to building a more informed and resilient cybersecurity ecosystem by sharing actionable insights and understanding context-rich threats.
Books

Understanding AI in Cybersecurity and Secure AI: Challenges, Strategies, and Trends
ISBN: 978-3-031-91523-9
Canada, 2025

Understanding Cybersecurity Management in Healthcare: Challenges, Strategies, and Trends
ISBN: 978-3-031-68033-5
Canada, 2024

Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends
ISBN: 978-3-031-48864-1
Canada, 2023

ISBN: 978-3-030-88703-2
Canada, 2022

Understanding Cybersecurity Management in Decentralized Finance
ISBN: 978-3-031-23340-1
Canada, 2022
Understanding Cybersecurity Series (UCS) knowledge mobilization annual bulletins:
First Volume (Cybersecurity Month - 2025)
USC-Vol 2-2025 (PDF)
First Volume (Cybersecurity Month - 2024)
USC-Vol 1-2024 (PDF)
Articles
Toward Generating a Large-Scale IoT-Zwave Intrusion Detection Dataset: Smart Device Profiling, Intruders' Behaviour, and Traffic Characterization
Mohammad Moein Shafi and Arash Habibi Lashkari, The Journal of Internet of Things, Vol. 34, 2025 (Q1, IF=7.6)
A Novel Deep Learning-Based Vulnerability Detection in Smart Contracts Using Masked Attention and Control Flow Graph Analysis
Maƫlle Gautrina, Arash Habibi Lashkaria, and Sepideh HajiHosseinKhani, International Journal of Information Security, Vol. 24, #240, 2025 (Q2, IF=3.2)
CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network
Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, under review)
SCsVulSegLytix: Detecting and Extracting Vulnerable Segments from Smart Contracts Using Weakly-Supervised Learning
Borna Ahmadzadeha, Arousha Haghighian Roudsari, Sepideh HajiHosseinKhani and Arash Habibi Lashkari, Journal of Systems and Software, Vol. 231, 2025 (Q1, IF=4.1)
Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology
Yasin Dehfuli and Arash Habibi Lashkari, ACM Computing Surveys, Volume 58, Issue 4 (Q1, IF=28)
VADViT: Vision Transformer-Driven Memory Forensics for Malicious Process Detection and Explainable Threat Attribution
Yasin Dehfuli and Arash Habibi Lashkari, The Journal of Information Security and Applications, Vol. 94, 2025 (Q1, IF=3.7)
Unveiling Evasive Malware Behavior: Towards Generating a Multi-Sources Benchmark Dataset and Evasive Malware Behavior Profiling Using Network Traffic and Memory Analysis
Arash Habibi Lashkari, Mohammad Moein Shafi, Yongkun Li, Abhay Pratap Singh, Ashley Barkworth, The Journal of Supercomputing, Vol. 81, article number 782, 2025 (Q1, IF=2.5)
Advanced Genetic Algorithm and Penalty Fitness Function for Enhancing DeFi Security and Detecting Ethereum Fraud Transactions
Arash Habibi Lashkari, Sepideh Hajihosseinkhani, Joshua Duarte, Isabella Lopez, Ziba Habibi Lashkari, Sergio Rios-Aguilar, Blockchain: Research and Applications, 2025 (Q1, IF=5.6)
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification
Adit Sharma, Arash Habibi Lashkari, International Journal of Information Security, Vol. 24, article number 144, 2025 (Q2, IF=2.4)
Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 6, Issue 2, 2025, 100253 (Q1, IF=2.5)
Moein Shafi, Arash Habibi Lashkari, A.H. & Arousha Haghighian Roudsari, Journal of Netw System Management Vol. 33, 44, 2025 (Q1, IF=4.1)
Niosha Hejazi, Arash Habibi Lashkari, Journal of Network and Computer Applications, Vol. 237,
2025, 104142 (Q1, IF=7.7)
Adit Sharma, Arash Habibi Lashkari, Computer Networks, Vol. 257, February 2025, 110984 (Q1, IF=4.4)
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computers & Security, 2024, 104160 (Q1, IF=5.6)
Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis
MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Vol. 118, Part B, 2024 (Q1, IF=4.0)
IoT malware: An attribute-based taxonomy, detection mechanisms, and challenges
Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023 (Q2, IF=4.2)
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023 (Q2, IF=4.2)
Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4, 2023 (Q1, IF=2.5)
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Habibi Lashkari, Computers & Security Journal, Vol. 120, 2022 (Q1, IF=5.6)
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms, and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, Vol. 2, Issue 6, 2023 (Q2, IF=2.2)
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, 2023 (Q1, IF=3.22)


