Skip to main content Skip to local navigation
Home » Posts tagged 'Post'

Post

Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) Knowledge Mobilization Program

UWORCS 2026, Western University (April 10, 2026) Elevating Cybersecurity Vigilance: Fusing Knowledge Dissemination via the Understanding Cybersecurity Series (UCS) knowledge mobilization Program We continue advancing cybersecurity awareness through our Understanding Cybersecurity Series (UCS), designed for students, researchers, developers, and industry professionals. UCS aims to equip communities with the knowledge and tools needed to address evolving […]

New Article Alert!

MQTTFlowLyzer: interpretable TabNet-based flow-level MQTT intrusion detection for IoT MQTT is widely used in IoT systems but remains vulnerable due to its lightweight design. This paper proposes an interpretable deep learning-based intrusion detection framework that processes raw PCAP data through flow-based analysis. It introduces MQTTFlowLyzer for extracting protocol-aware features and presents the BCCC-IoT-MQTT-IDS-2025 dataset, which […]

New Dataset Alert! (BCCC-MalMem-SnapLog-2025)

Malware Memory Snapshot and process-level behavioral Log Dataset (BCCC-MalMem-SnapLog-2025) The dataset was systematically developed to capture memory-level behavioral dynamics of malware and benign processes through interval-based snapshot analysis. Unlike prior datasets that predominantly rely on static binaries or network-level observations, this dataset focuses on runtime memory behavior and process persistence, enabling a deeper understanding of how malicious activities […]

New Article Alert!

CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network In-vehicle Controller Area Networks (CAN) are vulnerable to various injection attacks that can compromise the safety of vehicle occupants and result in financial losses. While a substantial body of work on CAN intrusion detection exists, it lacks multiclass attack classification models. […]

New Dataset Alert! (BCCC-IoT-IDS-Zwave-2025)

BCCC-IoT-IDS-Zwave-2025 We released a large-scale, multi-source IoT security dataset developed over five months (20 TB data, including more than 1 BILLION records) using a comprehensive smart-home testbed comprising more than 110 devices, including sensors, actuators, smart plugs, locks, meters, and controllers. According to the paper, the dataset includes 88 distinct attack scenarios spanning network-layer, device-layer, and service-layer threats, making it […]

New Article Alert!

A deep learning-based vulnerability detection in blockchain smart contracts using masked attention and control flow graph analysis SCs are self-executing programs on the blockchain, used for transactions without intermediaries, particularly in cryptocurrencies like Ethereum. However, they are vulnerable to security flaws that can lead to significant financial losses, as demonstrated by the DAO hack 2016. […]

New Article Alert!

Toward generating a large-scale IoT-Zwave intrusion detection dataset: Smart device profiling, intruders behavior, and traffic characterization This article introduces BCCC-IoT-IDS-Zwave-2025, the most extensive and diverse IoT smart home dataset to date, developed over five months using a large-scale testbed comprising more than 50 IoT devices and encompassing over 80 distinct attack scenarios. Unlike prior datasets […]

Blockchain Security: DeFi Transaction Analyzer and Feature Extractor ( DeFiTranLyzer-V1.0 )

DeFi Transaction Analyzer and Feature Extractor ( DeFiTranLyzer-V1.0 ) DeFiTransLyzer, part of the Understanding Cybersecurity Series (UCS), is an open-source Python framework for analyzing Ethereum wallets and transactions in DeFi research.The Wallet Analyzer extracts statistical and behavioral features such as gas usage, transaction duration, and address diversity, while the Transaction Analyzer captures efficiency ratios, event logs, and […]

The second CyberSecurity Cartoon Award (CSCA) – Hosted by Universidad Politécnica de Madrid (Spain)

BCCC, York University, Toronto, ON, Canada The second CyberSecurity Cartoon Award (CSCA) – Hosted by Universidad Politécnica de Madrid (Spain) Today, October 6, We’re excited to announce the official winners of the second CyberSecurity Cartoon Award (CSCA 2025); a flagship initiative under the Understanding Cybersecurity Series (UCS) program, dedicated to promoting cybersecurity awareness among K-12 […]

New Dataset Alert! (BCCC-DeFiFraudTrans-2025)

DeFi Fraud Transactions (BCCC-DeFiFraudTrans-2025) We released the BCCC-DeFiFraudTrans-2025, a large-scale, Ethereum-based benchmark designed explicitly for profiling fraudulent and legitimate DeFi transactions. It contains 1,026,867 annotated transaction samples spanning from 2017 to 2024, drawn from 9,374 unique wallet addresses. The dataset integrates both wallet-level and transaction-level attributes, with 79 features extracted via the DeFiTransLyzer-V1.0 analyzer... Dataset: BCCC-DeFiFraudTrans-2025