Skip to main content Skip to local navigation
Home » Publications

Publications

To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program, at BCCC we strive to gather, define, and impart fundamental knowledge and understanding to the general public in a manner that is comprehensible, accessible, and inclusive. Our objective is to support the education and training of IT systems and cybersecurity students, academics, researchers, developers, and industry professionals while also disseminating some of the more easily understandable and applicable research findings to the wider community.

Articles

Toward Generating a New Cloud-based Distributed Denial of Service (DDoS) Dataset and Intrusion Traffic Characterization

MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo, Information, Vol 15(3), 131, (2024)

NLFlowLyzer: Toward Generating an Intrusion Detection Dataset and Intruders Behavior Profiling through Network Layer Traffic Analysis and Pattern Extraction

MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computer & Security, Submitted (2023)

Intruders behavior Unveiled: Toward Generating an Intrusion Detection Dataset and Intruders Behavioral Profiling using Network Layer Traffic Flow Analysis (NLFlowLyzer)

MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, International Journal of Information Security, Submitted (2023)


Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning

Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17 (2023)

A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence (2023)

Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey

Xie He, Nikhill Vombatkere, Arash Habibi Lashkari, Dilli Prasad Sharma, Information, Vol 15(3), 131, 2024


IoT malware: An attribute-based taxonomy, detection mechanisms and challenges

Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong & Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol 16, pages1380–1431(2023)

Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset

Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4 (2023)

Detection, Characterization and Profiling DOH Malicious Traffic Using Statistical Pattern Recognition

Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, (2023)


AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework

Abhishek Chopra , Nikhill Vombatkere , Arash Habibi Lashkari, The 12th International Conference on Communication and Network Security (ICCNS), China (2022)

Robust stacking ensemble model for darknet traffic classification under adversarial settings

Hardhik Mohanty, Arousha Haghighian Roudsari and Arash Habibi Lashkari, Computers & Security Journal, Vol 120, 2022

An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation

Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC,USA (2023)