To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program, at BCCC we strive to gather, define, and impart fundamental knowledge and understanding to the general public in a manner that is comprehensible, accessible, and inclusive. Our objective is to support the education and training of IT systems and cybersecurity students, academics, researchers, developers, and industry professionals while also disseminating some of the more easily understandable and applicable research findings to the wider community.
Books
Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends
ISBN: 978-3-031-48864-1
Canada, 2023
ISBN: 978-3-030-88703-2
Canada, 2022
Understanding Cybersecurity Management in Decentralized Finance
ISBN: 978-3-031-23340-1
Canada, 2022
Articles
Toward Generating a New Cloud-based Distributed Denial of Service (DDoS) Dataset and Intrusion Traffic Characterization
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo, Information, Vol 15(3), 131, (2024)
NLFlowLyzer: Toward Generating an Intrusion Detection Dataset and Intruders Behavior Profiling through Network Layer Traffic Analysis and Pattern Extraction
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computer & Security, Submitted (2023)
Intruders behavior Unveiled: Toward Generating an Intrusion Detection Dataset and Intruders Behavioral Profiling using Network Layer Traffic Flow Analysis (NLFlowLyzer)
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, International Journal of Information Security, Submitted (2023)
Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17 (2023)
A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence (2023)
Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey
Xie He, Nikhill Vombatkere, Arash Habibi Lashkari, Dilli Prasad Sharma, Information, Vol 15(3), 131, 2024
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges
Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong & Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol 16, pages1380–1431(2023)
Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4 (2023)
Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, (2023)
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework
Abhishek Chopra , Nikhill Vombatkere , Arash Habibi Lashkari, The 12th International Conference on Communication and Network Security (ICCNS), China (2022)
Robust stacking ensemble model for darknet traffic classification under adversarial settings
Hardhik Mohanty, Arousha Haghighian Roudsari and Arash Habibi Lashkari, Computers & Security Journal, Vol 120, 2022
An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation
Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC,USA (2023)