Skip to main content Skip to local navigation
Home » Cybersecurity Data Analyzers & Datasets » Cybersecurity Datasets (Intelligence-led Security)

Cybersecurity Datasets (Intelligence-led Security)

As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we generate and release cybersecurity datasets to support AI-powered model training and testing, Cyber Threat Intelligence (CTI) analysis, and Intelligence-led Security Testing procedures for students, researchers, and developers to test and evaluate their models, frameworks, or products.

11. Large-Scale Multisources Malware Analysis Dataset using Network Traffic and Memory (BCCC-Mal-NetMem-2025)

The BCCC-Mal-NetMem-2025 dataset comprises over 7.7 million labeled records generated from controlled experiments involving 15 malware categories and 32 individual malware samples. These categories include ransomware, Trojan downloaders, coin miners, remote access tools (RATs), spyware, backdoors, and worms. The data was collected by executing each malware in isolated Windows environments equipped with real-time network and memory monitoring tools to ensure comprehensive behavioral capture. The dataset integrates both memory and network traffic features, offering a multidimensional view of malware behavior for accurate profiling. This hybrid structure allows for advanced AI-driven threat detection and malware characterization, with consistent labeling and session-based organization that supports detailed analysis. The BCCC-Mal-NetMem-2025 is a unique benchmark for behavioral malware analysis, bridging gaps between static profiling and real-world execution patterns.

The full research paper outlining the details of the dataset and its underlying principles:

"Unveiling Evasive Malware Behavior: Towards Generating a Multi-Sources Benchmark Dataset and Evasive Malware Behavior Profiling Using Network Traffic and Memory Analysis", Arash Habibi Lashkari, MohammadMoein Shafi, Yongkun Li, Abhay Pratap Singh, Ashley Barkworth, Journal of Supercomputing, 2025

Download Dataset:

10. Large-Scale Intrusion Detection Dataset (BCCC-CSE-CIC-IDS2018)

The BCCC-CSE-CIC-IDS2018 dataset is an enhanced version of CSE-CIC-IDS2018 with 46 million labelled records and 300 features, addressing key issues to improve data quality and reliability for behavioral profiling in IDS research. Labeling inconsistencies, particularly for DoS attacks, were corrected by aligning attack labels with attacker IPs instead of timestamps. NTLFlowLyzer, a new network traffic analyzer, was developed to resolve anomalies in extracted features and refine feature implementation. Additionally, protocol issues were fixed by removing UDP-based attacks previously misclassified due to TCP-specific analysis. Attacks with insufficient flow counts were retained but excluded from analysis and profiling. The dataset now includes an expanded feature set to better detect evolving cyber threats, making it a robust benchmark for AI-driven IDS/IPS research.

The full research paper outlining the details of the dataset and its underlying principles:

"Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)", MohammadMoein Shafi, Arash Habibi Lashkari & Arousha Haghighian Roudsari, Journal of Network and Systems Management, Vol 33, article 44, 2025

Download Dataset:

9. Smart Contracts Vulnerabilities (BCCC-SCsVuls-2024)

The BCCC-SCsVuls-2024 dataset is a comprehensive resource for analyzing and detecting vulnerabilities in Solidity-based smart contracts, featuring 111,897 meticulously labeled samples across 11 vulnerabilities such as Re-entrancy (17,698), IntegerUO (16,740), DenialOfService (12,394), and Secure contracts (26,914). The dataset was curated from reputable sources like Smart Bugs, Ethereum SCs, and SmartScan-Dataset, ensuring diverse and representative vulnerability coverage. All entries were processed into SHA-256 hashes to maintain integrity and uniqueness, eliminating duplicates. This dataset provides a robust foundation for developing and testing vulnerability detection models for smart contracts, advancing research in blockchain security.

The full research paper outlining the details of the dataset and its underlying principles:

"Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark Dataset", Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, December 2024, 100253

Download Dataset:

8. Intrusion Detection Dataset (BCCC-CIC-IDS2017)

Using NLFlowLyzer, we successfully generated the “BCCC-CIC-IDS2017” dataset by extracting key flows from raw network traffic data of CIC-IDS2017, resulting in CSV files integrating essential network and transport layer features. This new dataset offers a structured approach for analyzing intrusion detection, combining diverse traffic types into multiple sub-categories. The “BCCC-CIC-IDS2017” dataset enriches the depth and variety needed to rigorously evaluate our proposed profiling model, advancing research in network security and enhancing the development of intrusion detection systems.

The full research paper outlining the details of the dataset and its underlying principles:

"NTLFlowLyzer: Toward Generating an Intrusion Detection Dataset and Intruders Behavior Profiling through Network Layer Traffic Analysis and Pattern Extraction, MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computer & Security, Computers & Security, 104160, ISSN 0167-4048 (2024)"

Download Dataset:

7. Tabular IoT Attack Dataset (CIC-BCCC-NRC TabularIoTAttack-2024)

The CIC-BCCC-NRC TabularIoTAttack-2024 dataset is a comprehensive collection of IoT network traffic data generated as part of an advanced effort to create a reliable source for training and testing AI-powered IoT cybersecurity models. This dataset is designed to address modern challenges in detecting and identifying IoT-specific cyberattacks, offering a rich and diverse set of labeled data that reflects realistic IoT network behaviours. The dataset extracted a wide array of network characteristics using CICFlowMeter, with each record containing relevant features such as network flows, timestamps, source/destination IPs, and attack labels.

The full research paper outlining the details of the dataset and its underlying principles:

"An Efficient Self Attention-Based 1D-CNN-LSTM Network for IoT Attack Detection and Identification Using Network Traffic”, Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, 2024, ISSN 2949-7159, https://doi.org/10.1016/j.jiixd.2024.09.001

Download Dataset:

6. Malicious DNS and Attacks (BCCC-CIC-Bell-DNS-2024)

Using ALFlowLyzer, we successfully generated an augmented dataset, "BCCC-CIC-Bell-DNS-2024," from two existing datasets: "CIC-Bell-DNS-2021" and "CIC-Bell-DNS-EXF-2021." ALFlowLyzer enabled the extraction of essential flows from raw network traffic data, resulting in CSV files that integrate DNS metadata and application layer features. This new dataset combines light and heavy data exfiltration traffic into six unique sub-categories, providing a comprehensive structure for analyzing DNS data exfiltration attacks. The "BCCC-CIC-Bell-DNS-2024" dataset enhances the richness and diversity needed to evaluate our proposed profiling model effectively.

The full research paper outlining the details of the dataset and its underlying principles:

"Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis", Shafi, MohammadMoein, Arash Habibi Lashkari, Hardhik Mohanty; Computers and Electrical Engineering, 2024

Download Dataset:

5. Cloud DDoS Attacks (BCCC-cPacket-Cloud-DDoS-2024)

The distributed denial of service attack poses a significant threat to network security. The effectiveness of new detection methods depends heavily on well-constructed datasets. After conducting an in-depth analysis of 16 publicly available datasets and identifying their shortcomings across various dimensions, the 'BCCC-cPacket-Cloud-DDoS-2024' is meticulously created, addressing challenges identified in previous datasets through a cloud infrastructure. The dataset contains over eight benign user activities and 17 DDoS attack scenarios. The dataset is fully labeled (with a total of 26 labels) with over 300 features extracted from the network and transport layers of the traffic flows using NTLFlowLyzer. The dataset's extensive size and comprehensive features make it a valuable resource for researchers and practitioners to develop and validate more robust and accurate DDoS detection and mitigation strategies. Furthermore, researchers can leverage the 'BCCC-cPacket-Cloud-DDoS-2024' dataset to train learning-based models aimed at predicting benign user behavior, detecting attacks, identifying patterns, classifying network data, etc.

The full research paper outlining the details of the dataset and its underlying principles:

"Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization", Shafi, MohammadMoein, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo.; Information 15, no. 4: 195. https://doi.org/10.3390/info15040195

Download Dataset:

4. DNS over HTTPS ( BCCC-CIRA-CIC-DoHBrw-2020 )

The 'BCCC-CIRA-CIC-DoHBrw-2020' as an augmented dataset was created to address the imbalance in the 'CIRA-CIC-DoBre-2020' dataset. Unlike the 'CIRA-CIC-DoHBrw-2020' dataset, which is skewed with about 90% malicious and only 10% benign Domain over HTTPS (DoH) network traffic, the 'BCCC-CIRA-CIC-DoHBrw-2020' dataset offers a more balanced composition. It includes equal numbers of malicious and benign DoH network traffic instances, with 249,836 instances in each category. This balance was achieved using the Synthetic Minority Over-sampling Technique (SMOTE). The 'BCCC-CIRA-CIC-DoHBrw-2020' dataset comprises three CSV files: one for malicious DoH traffic, one for benign DoH traffic, and a third that combines both types. 

The full research paper outlining the details of the dataset and its underlying principles:

https://link.springer.com/article/10.1007/s12083-023-01597-4“Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning“, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023

Download Dataset:

3. Vulnerable Smart Contracts (BCCC-VulSCs-2023)

The BCCC-VulSCs-2023 dataset is a substantial collection for Solidity Smart Contracts (SCs) analysis, comprising 36,670 samples, each enriched with 70 feature columns. These features include the raw source code of the smart contract, a hashed version of the source code for secure referencing, and a binary label that indicates a contract as secure (0) or vulnerable (1). The dataset's extensive size and comprehensive features make it a valuable resource for machine-learning models to predict contract behavior, identify patterns, or classify contracts based on security and functionality criteria.

The full research paper outlining the details of the dataset and its underlying principles:

“Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023

Download Dataset:

2. SQL Injection Attack (BCCC-SFU-SQLInj-2023)

This dataset consists of a collection of 11,012 evasive or sophisticated malicious SQL queries. These queries are generated using a genetic algorithm applied to the Kaggle malicious SQL dataset. The goal of the genetic algorithm is to enhance the evasiveness and sophistication of the original malicious queries.

The full research paper outlining the details of the dataset and its underlying principles:

"An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation", Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC, USA

1. Source Code Authorship Attribution (YU-SCAA-2022)

Source Code Authorship Attribution (SCAA) is the technique to find the real author of source code in a corpus. Though it is a privacy threat to open-source programmers, it has shown to be significantly helpful in developing forensic-based applications such as ghostwriting detection, copyright dispute settlements, catching authors of malicious applications using source code, and other code analysis applications. This dataset was created by extracting ’code’ data from the GCJ, and GitHub datasets, including examples of attacks and adversarial examples, were created using Source Code Imitator. The dataset has a total of 1,632 code files from 204 authors.

The full research paper outlining the details of the dataset and its underlying principles:

”AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework”, Abhishek Chopra , Nikhill Vombatkere , Arash Habibi Lashkari, The 12th International Conference on Communication and Network Security (ICCNS), 2022, China

Download Dataset:

Who has used our cybersecurity datasets and Analyzers (since September 2023)?

Leaflet © OpenStreetMap contributors

A

  • Aalim Muhammed Salegh College Of Engineering, India
  • Abudhabi University, United Arab Emirates (UAE)
  • Academia de Studii Economice din Bucuresti (ASE), Romania
  • Aditya Institute of Technology and Management (AITAM), India
  • Ain Shams University, Egypt 
  • Air University, Pakistan  
  • Al-Yarmouk, Jordan
  • Al Hussein Technical University, Jordan
  • Ala-Too International University, Kyrgyzstan
  • Aliah University, India 
  • Alibaba, China
  • Algoma Univeristy, Canada
  • Amazon, India  
  • American International University, Bangladesh
  • American University in the Emirates, United Arab Emirates 
  • American University of Sharjah, United Arab Emirates 
  • Amity University Rajasthan, India
  • Amrita Vishwa Vidyapeetham University, India 
  • Antonine University (UA), Lebanon
  • Australian Department of Defence, Australia 

B

  • Babeș-Bolyai University (BBU), Romania
  • Bahrain Polytechnic, Bahrain
  • Banaras Hindu University, India
  • Beijing Information Science & Technology University, China
  • Beijing Jiaotong University, China 
  • Beijing University of Civil Engineering & Architecture (BUCEA), China
  • Beijing University of Posts and Telecommunications, China
  • Bennett University, India
  • Betty Dubois, US
  • Bharatiya Engineering Science and Technology Innovation University, India
  • Birla Institute of Technology And Science - Pilani (BITS), India
  • Bingol University, Turkey
  • Birmingham City University, England  
  • Birkbeck University of London, England
  • BlueLotus, Columbia
  • BlueLotus, Turkey
  • Bml Munjal University, India
  • Bocconi University, Italy
  • Botho University, Botswana
  • Bowie State University, United States of America
  • Bozorgmehr University, Iran 

C

  • Ca' Foscari University of Venice, Italy
  • Caplogy, France
  • Carleton University, Canada
  • Centennial College, Canada
  • Central Queensland University (CQU), Australia
  • ChangChun University, China
  • Christ Academy Institute for Advanced Studies (CAIAS), India 
  • Catholic University of the Sacred Heart, Italy 
  • Central South University, China 
  • Charles Sturt University, Australia
  • China Telecom, China
  • Christ Academy College for Advanced Studies, India 
  • Chung-Ang University, Korea
  • CINEC, Sri Lanka
  • Cisco Systems Inc, United States of America
  • Clark University, United States of America
  • Cochin University of Science and Technology, India  
  • CodePath, United States of America
  • COEP Technological University, India  
  • Complex Systems Research Lab, Pakistan
  • Conestoga College, Canada
  • Consultant, UK 
  • Cooperative University of Kenya
  • cPacket, United States of America
  • CQVista Inc., South Korea 
  • CUAB, Nigeria 
  • Cyber, Belgium 
  • Cyber Fix Ltd, Pakistan
  • Cyber Fort, Nigeria
  • Cyber Silo Inc., United States of America

D

  • Dalhousie University, Canada  
  • Dalian Jiaotong University, China 
  • Deakin University, Australia 
  • Delhi Technological University, India 
  • Deloitte, Japan
  • Deputy Social Media Secretary, Pakistan
  • Dr. Shariati Technical and Vocational College, Iran 
  • Durham College, Canada
  • Duy Tan University, Vietnam
  • DXC Technology, Italia

E

  • Early Code Training Institute, Nigeria
  • East China Normal University, China  
  • Eastern Institute of Technology, New Zealand 
  • Edectus.com
  • Edinburgh Napier University, UK
  • Egypt-Japan University of Science and Technology (E-JUST), Egypt
  • Emory University, United States of America
  • Enugu State University of Science and Technology, Nigeria
  • Equinix, United States of America
  • Erlangen University, Germany 
  • Eskisehir Osmangazi University, Turkey
  • EXATEL, Poland
  • Ezam Co., Iran

F

  • Fachhochschule der Wirtschaft, Germany 
  • Faculdade de Ciências da Universidade do Porto, Portugal
  • Federal University of Vicosa (UFV), Brazil
  • Feng Chia University, Taiwan 
  • EFREI PARIS, France
  • FHDW Paderborn, Germany 
  • Fitchburg State University, United States of America
  • Fluminense Federal University, Brasil
  • French National Institute for Research in Digital Science and Technology, France
  • Fudan University, China
  • Fundação Getulio Vargas (FGV), Brazil
  • Fuzhou University, China  

G

  • Gandhi Institute of Technology and Management, India
  • General Assembly, Bahrain 
  • George Mason University, United States of America
  • George Washington University, United States of America
  • German University In Cairo, Egypt
  • Ghent University, IDLab-Imec, Belgium 
  • Google, United States of America
  • Graphic Deemed University, India 
  • Green University of Bangladesh, Bangladesh
  • Guru Govind Singh University, India 

H

  • Hadhramout University, Yemen
  • Hangzhou Dianzi University, China
  • Harbin Institute of Technology, China
  • Harward university, United Stated of America
  • Heilongjiang University, China
  • Higher Technology Institute, Egypt
  • HIRU TV, Sri Lanka
  • Ho Chi Minh City University of Technology (HCMUT), Vietnam
  • Hogeschool van Amsterdam, Netherlands
  • Hohai University, China  
  • Holy Angel University, Philippines 
  • HTI, Egypt
  • HVA International, Netherlands
  • HUST, Vietnam 

I

  • i4 Ops, United States of America
  • IIIT Surat, India
  • Institute for Advanced Study (IAS), United States of America
  • Institute of Technology (IUT) of Béziers, University of Montpellier, France
  • Institut Superieur d'Informatique de Mahdia, Tunisia
  • Institut Teknologi Bandung, Indonesia
  • Instituto Superior de Ciências de Educação da Huíla (ISCED-Huíla), Angola
  • Iqra University - Islamabad Campus (IUIC), Pakistan
  • IILM Univeristy, India
  • IIT BHU, India
  • Illinois Institute of Technology, United States of America
  • Indian Institute of Technology (BHU) Varanasi, India 
  • IMP Group International, Canada
  • Informatics Institute of Technology, Sri Lanka
  • Institute of Technology of Cambodia, Cambodia  
  • Instituto Militar de Engenharia (IME), Brazil
  • IPN, Mexico
  • Islamic Azad University, Iran 
  • Istanbul Commerce University (İstanbul Ticaret Üniversitesi), Turkey
  • Istanbul Technical University, Turkey
  • Ivan Franko National University of Lviv, Ukraine

J

  • Jain University, India
  • Jiangsu University, China 
  • Jinan University, China
  • Johns Hopkins University, United States of America
  • John Jay College of Criminal Justice, United States of America
  • Jordan University of Science & Technology (JUST), Jordan
  • JNU, China 

K

  • Kadir Has University, Türkiye
  • Kansas State University (KSU), United Stated of America
  • Kaplan Business School, Australia
  • Karachi Institute of Economics and Technology (KIET), India
  • Karnatak Lingayat Education Technological University, India
  • Keele University, UK
  • Kennesaw State University, United States of America
  • Kent State University, United States of America
  • Khwaja Fareed University of Engineering & Information Technology (KFUEIT), Pakistan
  • King Monkut Institute of Technology Ladkrabang, Thailand
  • KMUTNB, Thailand 
  • KNUST, Ghana
  • Kookmin University, South Korea
  • Kumoh National insitittute of Technology, South Korea
  • Kütahya Dumlupınar üniversitesi, Turkey 

L

  • Laboratoire Informatique, Image et Interaction (L3i), France
  • Langara College, Canada
  • La Salle University - Ramon Llull, Spain 
  • Lahore Leads University (LLU), Pakistan
  • Lebanese American University (LAU), Lebanon
  • Libtan Acadmy, Libya
  • Load Go Transport Inc., Canada 
  • Ludwig-Maximilians-University, Germany

M

  • M.Kumarasamy College of Engineering (MKCE), India
  • Macau Polytechnic University, China
  • Madurai Kamaraj University, India 
  • Mahidol University, Thailand
  • Malaviya National Institute of Technology Jaipur (MNIT), India 
  • Malaya University, Malaysia
  • Malmö University, Sweden
  • Makerere University, Uganda
  • Maven Technical, Nigeria
  • Medcare MSO, Pakistan
  • McGill University, Canada
  • Michigan Technological University, United States of America
  • Middle Tennessee State University, United States of America
  • Misr International University, Egypt
  • MITRE.org, United States of America
  • Mojass Sdn. Bhd., Malaysia
  • Montclair State University, United States of America
  • Moscow State University of Technology (Stankin), Russia
  • Motilal Nehru National Institute of Technology, India
  • Mumbai University, India  
  • Murdoch University, Australia

N

  • Namal University Mianwali, Pakistan  
  • Najaf Abad University, Iran
  • Nanjing Tech, China  
  • Nanjing University of Science and Technology (NJUST), China  
  • Nanjing University, China  
  • Nara Institute of Science and Technology (NARA), Japan
  • National Centre For Cyber Security - UET Peshawar (NCCS-UETP), Pakistan
  • National College of Ireland, Ireland
  • National Forensic Sciences University (NFSU), India  
  • National Forensic Sciences University, India  
  • National Institute of Technology Karnataka (NITK), India  
  • National Institute of Technology(NIT), India  
  • National Intelligence and Research University College, Kenya
  • National Sun Yat-sen University, Taiwan  
  • National Taiwan University of Science and Technology, Taiwan  
  • National Taiwan University, Taiwan
  • National Technical University of Athens (NTUA(, Greece
  • National Technological University of South Lima, Peru
  • National University of Defense Technology, China 
  • National University of Technology (NUTECH), Pakistan  
  • National University of Singapore (NUS), Singapore
  • New Mansoura University, Egypt  
  • New Mexico State University, United States of America
  • New York University Tandon, United States of America
  • Ngee Ann Polytechnic, Singapore
  • NIELIT Calicut, India  
  • NIIT University, India
  • Nile University, Egypt 
  • Nirma University, India 
  • North Carolina State University, United States of America
  • North China Electric Power University, China
  • Northeastern University (University in Shenyang), China
  • Northeastern University, United States of America
  • National University of Sciences & Technology (NUST), Pakistan  

O

  • Oita University, Japan
  • Oriental University, India

P

  • Pabna University of Science and Technology, Bangladesh  
  • Panimalar, India
  • Parahyangan catholic university, Indonesia  
  • Pentangularit, Bangladesh
  • Polytechnic Institute of Leiria (IPLeiria), Portugal 
  • Politeknik Negeri Cilacap, Indonesia
  • PolyU, Poland
  • Posts and Telecommunications Institute of Technology (PTIT), Vietnam
  • Premier University, Bangladesh  
  • Prime University, Bangladesh
  • Prince Sattam bin Abdulaziz University, Saudi Arabia
  • Princess Nourah Bint Abdul Rahman University, Saudi Arabia  
  • Princess Sumaya University for Technology (PSUT), Jordan
  • Prince Sattam Bin Abdulaziz University, Saudi Arabia 
  • PSG College of Technology, India 
  • PSL Research University, France  
  • PUC Minas, Brazil
  • Pusan National University (PNU), South Korea 

Q

  • Quaid-e-Azam University, Pakistan
  • Quantea.com, United States of America
  • Queen's University, Canada
  • Queen Mary University of London, UK 

R

  • rAIxon, UK
  • Red Moon, United States of America
  • Rentile, Czech
  • Reva University, India    
  • Rey Juan Carlos University, Spain
  • Rice University, United States of America
  • Rochester Institute of Technology, United States of America
  • Royal Military College of Canada,
  • RUDRA Cybersecurity, India 

S

  • S.E.A Protection Services, Canada  
  • Sacred Heart University (SHU), United States of America
  • Samsun University, Turkey
  • Sardar Patel Institute of Technology, India  
  • São Paulo State University, Brazil 
  • Saveetha Engineering College, India
  • secunet Security Networks AG, Germany
  • SecureITlab, Bahrain  
  • Selçuk Üniversitesi, Turkey  
  • Seneca College, Canada  
  • Shahid Beheshti University, Iran 
  • Shahid Rajaee University, Iran
  • Sharda University, India
  • Shandong University, China  
  • Shaqra University, Saudi Arabia
  • Shenzhen University, Yaman
  • Siberian Federal University, Siberia  
  • Siddaganga Institute of Technology (SIT), India
  • Singapore Institute of Directors (SID), Singapore
  • Singapore Management University (SMU), Singapore   
  • SoftCrafted.com
  • Sol Plaatje University, South Africa
  • South China University of Technology, China 
  • Southeast University, China 
  • Sri Krishna Arts and Science College, India  
  • Sri Ramaswamy Memorial Institute of Science and Technology (SRM), India
  • Sri Sivasubramaniya Nadar College of Engineering, India  
  • Srinivas University, India  
  • SRM Institute of Science and Technology, India  
  • Ss. Cyril and Methodius University in Skopje (UKIM), North Macedonia
  • St. Petersburg State University, Russia
  • Staffordshire University, UK
  • Stanford University, United States of America
  • State Polytechnic of Ujung Pandang, Indonesia  
  • Sulaimani Polytechnic University, Iraq
  • Swe, England  
  • Symbiosis Centre for Information Technology, India
  • Szkoła Główna Gospodarstwa Wiejskiego w Warszawie, Poland 

T

  • Taibah University, Saudi Arabia  
  • Technical and Vocational University. Shariaty Technical College, Iran  
  • Technical University of Cluj-Napoca, Romania
  • Technical University of Kosice (TUKE), Slovakia
  • Technological University of Panama, Panama  
  • Telkom University, Indonesia  
  • Texas A&M University, United States of America
  • Thamar University, Yemen
  • Third Sarl., Cameroon  
  • The Alan Turing Institute, UK
  • Tianjin University of Technology, China  
  • Tishreen University, Syria 
  • TNT Prowash and Preservation, Scotland
  • Todyl Inc, United States of America
  • Tokyo City University (TCU), Japan
  • Tokyo Metropolitan University, Japan
  • Tongji University, China   
  • Trideum Corporation, United States of America
  • Tshimologong Precinct, Technology Park in South Africa  
  • Tsinghua University, China  
  • TU Wien, Austria 

U

  • UAF sub campus burewala, Pakistan
  • UCAS, Bangladesh
  • UCL, United States of America
  • UCSD, United States of America
  • Ulster University, United Kingdom
  • Ultra-Intelligent Computing/Communications Lab, Chung-Ang University, South Korea
  • UNB (Canadian Institute For Cybersecurity), Canada  
  • UiTM, Malaysia
  • UNED, Spain
  • Unesp - São Paulo State University, Brazil
  • Unisinos, Brazil
  • United Commercial Bank PLC, Bangladesh 
  • Universidad Carlos III de Madrid, Spain
  • Universidad Federal de Río Grande del Sur (UFRGS), Brazil
  • Universidade federal De lavras, Brazil
  • Universidad Politécnica Salesiana (UPS), Ecuador
  • Universidade Federal de Santa Catarina (UFSC), Brazil
  • Universidad Popular Autónoma del Estado de Puebla (UPAEP), Mexico 
  • Universidad Nacional de Educación a Distancia (UNED), Spain
  • Universidade Federal Fluminense (UFF), Brazil
  • Università di Palermo, Italy
  • Universitas Ciputra Surabaya, Indonesia
  • Universitas Royal, Indonesia
  • Universitas Pamulang, Indonesia
  • Universitas Pelita Harapan, Indonesia
  • Universitas Siliwangi, Indonecia
  • Université de Sherbrooke, Canada 
  • Université du Quebec en Outaouais (UQO), Canada
  • Université Internationale des Technologies de l'Information, Kazakhstan
  • Université Mohammed Premier (UMP), Morocco
  • Universiti Malaysia Pahang Al-Sultan Abdullah (UMPASA), Malaysia
  • Universiti Tenaga Nasional Malaysia, Malaysia  
  • Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia 
  • University Catholic of Maule, Chile
  • University College Dublin, Ireland  
  • University Mohammed 5 Rabat, Morocco  
  • University of Applied Sciences Munich (UDBW), Germany
  • University of Bristol, UK
  • University of Calgary, Canada
  • University of Cádiz, Spain
  • University of Mostar, Bosnia and Herzegovina
  • University College London
  • University of Auckland, New Zealand
  • University of Calgary, Canada  
  • University of California San Diego, United States of America
  • University of Calabria, Italy 
  • University of Campania, Italy  
  • University Charles III, Spain
  • University of Carthage, Tunesia
  • University of Caxias do Sul, Brazil  
  • University of Chicago, United States of America
  • University of Chinese Academy of Sciences, China 
  • University of Chinese Academy of Sciences (UCAS), China  
  • University of Colombo, Colombia
  • University of Delhi, India  
  • University of Dodoma, Tanzania
  • University of Doha for Science an Technology, Qatar
  • University of East London, UK 
  • University of Economics and Innovation in Lublin, Poland
  • University of Electronic Science and Technology of China, China 
  • University of Engineering & Applied Sciences (Swat), Pakistan 
  • University of Engineering and Technology (UET), Taxila, Pakistan 
  • University of Exeter, United Kingdom
  • University of Ferrara, Italia
  • University of Guelph, Canada 
  • University of Houston, United States of America
  • University of Indonesia, Indonesia
  • University of Jaén, Spain
  • University of Johannesburg, South Africa
  • University of Kashmir, Iraq
  • University of Kashmir, Pakistan
  • University of Kelaniya, Sri Lanka
  • University of Kufa, Iraq
  • university of London, UK
  • University of Malta, Malta
  • University of Muhammadiyah Malang, Indonesia
  • University of Nagasaki, Japan
  • University of New Mexico (UNM), Mexico
  • University of New Mexico, United States of America
  • University of Niagara Falls, Canada
  • University of Oulu, Finland
  • University of Oregon, United States of America
  • University of Padua, Italy
  • University of Quebec, Canada
  • University of Reading, England  
  • University of Riau, Indonesia 
  • University of São Paulo, Brazil
  • University of Science and Technology Chittagong, Bangladesh 
  • University of Salerno (UNISA), Italy
  • University of Sharjah, UAE
  • University of South Carolina, United States of America
  • University of Staffordshire, UK
  • University of Toronto (UofT), Canada
  • University of Victoria (UVIC), Canada
  • University of Texas, United States of America
  • University of the Chinese Academy of Sciences, China
  • University of Toronto, Canada
  • University of Vale do Rio dos Sinos Campus São Leopoldo (Unisions), Brazil
  • University of Waikato, New Zealand
  • University of Waterloo, Canada
  • University of Zürich, Switzerland
  • Universitas Pamulang, Indonesia
  • Universiti Sains Malaysia,
  • United International University (UIU), Bangladesh
  • United States Military Academy,
  • UNOB, Slovakia 
  • UNOC, Czech Republic 
  • UNSW Sydney, Australia
  • UPAEP, Mexico
  • USP, Brazil
  • USM, Malaysia 

V

  • Vellore Institute of Technology (VIT), India
  • Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India
  • Viavi Solutions, United States of America
  • Vietnamese-German University, Vietnam
  • Vishwakarma University, India 

W

  • Warsaw University of Technology, Poland
  • Wayne State University, United States of America
  • Westpac, Australia 
  • Wolkite University, Ethiopia
  • Wrocław University of Science and Technology, Poland
  • Wuhan university, China  

X

  • Xi'an University of Technology, China  

Y

  • YAYAFOOD, Nigeria 
  • York University, Canada 

Z

  • Zhejiang University, China