{"id":359,"date":"2023-05-11T09:23:38","date_gmt":"2023-05-11T13:23:38","guid":{"rendered":"https:\/\/www.yorku.ca\/laps\/research\/bcccdev\/?page_id=359"},"modified":"2026-04-16T13:45:46","modified_gmt":"2026-04-16T17:45:46","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<p>To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ To tackle the challenge of strengthening cybersecurity resiliency on a broader scale, it is vital to collaborate with the industry and use innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program at BCCC, we aim to gather, define, and convey fundamental knowledge and understanding to the general public in a manner that is clear, accessible, and inclusive. We aim to support the education and training of students, academics, researchers, developers, and industry professionals in IT systems and cybersecurity, recognizing that knowledge dissemination is a core component of <strong>Cyber Threat Intelligence (CTI)<\/strong>. We contribute to building a more informed and resilient cybersecurity ecosystem by sharing actionable insights and understanding context-rich threats.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group grey-bg-block has-very-light-gray-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Books<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"929\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png\" alt=\"\" class=\"wp-image-3462\" style=\"aspect-ratio:0.611353711790393;width:138px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png 589w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC-254x400.png 254w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-032-13273-4\">Understanding Cybersecurity Victim Services: Challenges, Strategies, and Trends <\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-032-13272-7<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2026<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"619\" height=\"869\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/12\/UCS-construction.png\" alt=\"\" class=\"wp-image-3374\" style=\"aspect-ratio:0.611353711790393;width:138px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/12\/UCS-construction.png 619w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/12\/UCS-construction-285x400.png 285w\" sizes=\"auto, (max-width: 619px) 100vw, 619px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/9783032133038\">Understanding Cybersecurity Management in Construction Managemenent <\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-032-13303-8<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2026<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"851\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/04\/UCSAI.png\" alt=\"\" class=\"wp-image-2093\" style=\"aspect-ratio:0.611353711790393;width:138px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/04\/UCSAI.png 633w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/04\/UCSAI-298x400.png 298w\" sizes=\"auto, (max-width: 633px) 100vw, 633px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/9783031915239\">Understanding AI in Cybersecurity and Secure AI: Challenges, Strategies, and Trends<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-031-91523-9<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2025<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"122\" height=\"199\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/08\/UCS-Healthcare.png\" alt=\"\" class=\"wp-image-1371\" style=\"width:140px;height:229px\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-68034-2\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cybersecurity Management in Healthcare: Challenges, Strategies, and Trends<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-031-68033-5<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2024<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"408\" height=\"665\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/11\/UCSSPh.png\" alt=\"\" class=\"wp-image-907\" style=\"width:145px;height:224px\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/11\/UCSSPh.png 408w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/11\/UCSSPh-245x400.png 245w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-48865-8\">Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-031-48864-1<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2023<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"239\" height=\"371\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/05\/978-3-031-14264-2.jpg\" alt=\"Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective Book Cover\" class=\"wp-image-436\" style=\"width:145px;height:224px\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/9783031142635\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">ISBN: 978-3-030-88703-2<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:12px\">Canada, 2022<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"239\" height=\"371\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2022\/04\/978-3-031-23340-1.jpg\" alt=\"Understanding Cybersecurity Management in Decentralized Finance Book Cover\" class=\"wp-image-440\" style=\"width:144px;height:223px\"\/><\/figure>\n\n\n\n<p style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-031-23340-1\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cybersecurity Management in Decentralized Finance<\/a><\/p>\n\n\n\n<p style=\"font-size:12px\">ISBN: 978-3-031-23340-1<\/p>\n\n\n\n<p style=\"font-size:12px\">Canada, 2022<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"239\" height=\"371\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2022\/04\/978-3-030-88704-9.jpg\" alt=\"Understanding Cybersecurity Law and Digital Privacy Book Cover\" class=\"wp-image-439\" style=\"width:144px;height:223px\"\/><\/figure>\n\n\n\n<p style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-030-88704-9\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cybersecurity Law and Digital Privacy<\/a><\/p>\n\n\n\n<p style=\"font-size:12px\">DOI: 978-3-030-88704-9<\/p>\n\n\n\n<p style=\"font-size:12px\">Canada, 2021<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"239\" height=\"371\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2022\/04\/978-3-030-79915-1.jpg\" alt=\"Understanding Cybersecurity Management in FinTech Book Cover\" class=\"wp-image-438\" style=\"width:145px;height:224px\"\/><\/figure>\n\n\n\n<p style=\"font-size:12px\"><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-030-79915-1\" target=\"_blank\" rel=\"noreferrer noopener\">Understanding Cybersecurity Management in FinTech<\/a> <\/p>\n\n\n\n<p style=\"font-size:12px\">DOI: 978-3-030-79915-1<\/p>\n\n\n\n<p style=\"font-size:12px\">Canada, 2021<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding Cybersecurity Series (UCS) knowledge mobilization annual bulletins:<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Second Volume (2025)<\/strong><\/p>\n\n\n\n<p>USC-Vol 2-2025 (PDF)<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button bg-primary-2 text-white rounded-0 learnmore-block p-2\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"http:\/\/www.ahlashkari.com\/PDFs\/UCS-Vol-2-2025.pdf\" style=\"color:#ffffff;background-color:#810001\" target=\"_blank\" rel=\"noreferrer noopener\">Download <i class=\"fas fa-chevron-right small pl-2\"><\/i><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>First Volume (2024)<\/strong><\/p>\n\n\n\n<p>USC-Vol 1-2024 (PDF)<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button bg-primary-2 text-white rounded-0 learnmore-block p-2\"><a class=\"wp-block-button__link has-text-color has-background wp-element-button\" href=\"http:\/\/www.ahlashkari.com\/PDFs\/UCS-Vol-1-2024.pdf\" style=\"color:#ffffff;background-color:#810001\" target=\"_blank\" rel=\"noreferrer noopener\">Download <i class=\"fas fa-chevron-right small pl-2\"><\/i><\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group grey-bg-block has-very-light-gray-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">Articles <\/h2>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong>Unveiling Malicious PDF Behavior: Interpretable Classification and Profiling Malicious PDF Using TabNet<\/strong><a href=\"CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, Accepted)\"><br><\/a>Arousha Haghighian Roudsari, Arash Habibi Lashkari and Woong-Kee Loh, Journal of Information Security and Applications, 2026 (Accepted - Under publication, <strong>Q1, IF=3.7<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11227-026-08494-6\"><strong>Unveiling intruders\u2019 behaviors: explainable AI-based profiling of malicious bot activiti<\/strong>es in IoT networks<\/a><a href=\"CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, Accepted)\"><br><\/a>Sepideh Niktabe, Dilli Prasad Sharma and Arash Habibi Lashkari, The Journal of Supercomputing, Vol.\u00a082, article\u00a0number\u00a0352, 2026 (<strong>Q2, IF=2.5<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11227-026-08485-7\"><strong>MQTTFlowLyzer: interpretable TabNet-based flow-level MQTT intrusion detection for IoT<\/strong><\/a><a href=\"CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, Accepted)\"><br><\/a>Arefeh Kouhi and Arash Habibi Lashkaria, The Journal of Supercomputing, Vol. 82, article\u00a0number\u00a0334, 2026 (<strong>Q2, IF=2.5<\/strong>)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128625009284\">CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network<\/a><\/strong><a href=\"CAN-BiGRUBERT: Unveiling Automotive Vehicle Intruders by Profiling and Characterizing Anomalies in Controller Area Network Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, 2025 (Q1, IF=4.6, Accepted)\"><br><\/a>Shaila Sharmin, Arash Habibi Lashkaria, Hafizah Mansorb and Andi Fitriah Abdul Kadirb, Computer Networks, Vol. 276, 2025 (<strong>Q1, IF=4.6<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660525002616?via%3Dihub\">Toward Generating a Large-Scale IoT-Zwave Intrusion Detection Dataset: Smart Device Profiling, Intruders' Behaviour, and Traffic Characterization<\/a><\/strong><br>Mohammad Moein Shafi and Arash Habibi Lashkari, The Journal of Internet of Things, Vol. 34, 2025 (<strong>Q1, IF=7.6<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01156-3\">A Novel Deep Learning-Based Vulnerability Detection in Smart Contracts Using Masked Attention and Control Flow Graph Analysis <\/a><\/strong><br>Ma\u00eblle Gautrina, Arash Habibi Lashkaria, and Sepideh HajiHosseinKhani, International Journal of Information Security, Vol. 24, #240, 2025 (<strong>Q2, IF=3.2<\/strong>)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"SCsVulSegLytix: Detecting and Extracting Vulnerable Segments from Smart Contracts Using Weakly-Supervised Learning\"><\/a><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121225002006\"><strong>SCsVulSegLytix: Detecting and Extracting Vulnerable Segments from Smart Contracts Using Weakly-Supervised Learnin<\/strong><\/a><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121225002006\">g<\/a><\/strong><\/strong><br>Borna Ahmadzadeha, Arousha Haghighian Roudsari, Sepideh HajiHosseinKhani and Arash Habibi Lashkari, Journal of Systems and Software, Vol. 231, 2025 <strong>(Q1, IF=4.1)<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-small-font-size\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3764580\"><strong>Memory Analysis for Malware Detection: A Comprehensive Survey Using the OSCAR Methodology<\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Yasin Dehfuli and Arash Habibi Lashkari, ACM Computing Surveys, Volume 58, Issue 4 (<strong>Q1, IF=28<\/strong>)<\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"VADViT: Vision Transformer-Driven Memory Forensics for Malicious Process Detection and Explainable Threat Attribution\"><\/a><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212625002376\"><strong>VADViT: Vision Transformer-Driven Memory Forensics for Malicious Process Detection and Explainable Threat Attribution<\/strong><\/a><br>Yasin Dehfuli and Arash Habibi Lashkari, The Journal of Information Security and Applications, Vol. 94, 2025 (<strong>Q1, IF=3.7<\/strong>)<meta charset=\"utf-8\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07267-x\">Unveiling Evasive Malware Behavior: Towards Generating a Multi-Sources Benchmark Dataset and Evasive Malware Behavior Profiling Using Network Traffic and Memory Analysis<\/a><\/strong><br>Arash Habibi Lashkari, Mohammad Moein Shafi, Yongkun Li, Abhay Pratap Singh, Ashley Barkworth, The Journal of Supercomputing, Vol.&nbsp;81, article&nbsp;number&nbsp;782, 2025 (<strong>Q2, IF=2.5<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121225002006\"><strong><\/strong><\/a><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720925001034\"><strong>Advanced Genetic Algorithm and Penalty Fitness Function for Enhancing DeFi Security and Detecting Ethereum Fraud Transac<\/strong><\/a><\/strong><strong><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720925001034\">tions<\/a><\/strong><\/strong><\/p>\n\n\n\n<p style=\"font-size:14px\">Arash Habibi Lashkari, Sepideh Hajihosseinkhani, Joshua Duarte, Isabella Lopez, Ziba Habibi Lashkari, Sergio Rios-Aguilar, Blockchain: Research and Applications, 2025 (<strong>Q1, IF=5.6<\/strong>)<meta charset=\"utf-8\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01064-6?utm_source=rct_congratemailt&amp;utm_medium=email&amp;utm_campaign=nonoa_20250526&amp;utm_content=10.1007%2Fs10207-025-01064-6\">Hybrid attention-enhanced explainable model for encrypted traffic detection and classification<\/a><\/strong><br><br>Adit Sharma, Arash Habibi Lashkari, International Journal of Information Security, Vol. 24, article&nbsp;number&nbsp;144, 2025 (<strong>Q2, IF=2.4<\/strong>)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720924000666\"><strong>Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark Dataset<\/strong><\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">Sepideh&nbsp;HajiHosseinKhani,&nbsp;Arash&nbsp;Habibi Lashkari,&nbsp;Ali&nbsp;Mizani Oskui, Blockchain: Research and Applications, Vol. 6, Issue 2,&nbsp;2025, 100253 <strong>(Q1, IF=2.5<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09917-0\">Toward Generating a Large-Scale Intrusion Detection Dataset and Intruders Behavioral Profiling using Network and Transportation Layers Traffic Flow Analyzer<\/a><\/strong><\/p>\n\n\n\n<p style=\"font-size:14px\">Moein Shafi, Arash Habibi Lashkari, A.H. &amp; Arousha Haghighian Roudsari, Journal of Netw System Management Vol. 33, 44, 2025 (<strong>Q1, IF=4.1<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1084804525000396\">A comprehensive survey of smart contracts vulnerability detection tools: Techniques and methodologies<\/a><\/strong><\/p>\n\n\n\n<p style=\"font-size:14px\">Niosha Hejazi, Arash Habibi Lashkari, Journal of Network and Computer Applications, Vol. 237,<br>2025, 104142 (<strong>Q1, IF=7.7<\/strong>)<\/p>\n\n\n\n<p style=\"font-size:14px\"><meta charset=\"utf-8\"><\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1389128624008168\">A survey on encrypted network traffic: A comprehensive survey of identification\/classification techniques, challenges, and future directions<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">Adit Sharma, Arash Habibi Lashkari, Computer Networks, Vol. 257, February 2025, 110984 (<strong>Q1, IF=4.4<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404824004656\"><strong>NTLFlowLyzer: Toward generating an intrusion detection dataset and intruder behavior profiling through network layer traffic analysis and pattern extraction<\/strong><\/a><\/p>\n\n\n\n<p class=\"has-small-font-size\">MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computers &amp; Security, 2024, 104160 (<strong>Q1, IF=5.6<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720924000666\"><\/a><strong><strong><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1084804525000396\">Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic<\/a><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0045790624003641\"> Analysis<\/a><\/strong><\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Vol. 118, Part B, 2024 (<strong>Q1, IF=4.0<\/strong>)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><strong><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01478-w\">IoT malware: An attribute-based taxonomy, detection mechanisms, and challenges<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-small-font-size\">Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023 (<strong>Q2, IF=4.2<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01597-4\"><strong>Unveiling DoH Tunnel: Toward Generating a Balanced DoH Encrypted Traffic Dataset and Profiling Malicious Behaviour using Inherently Interpretable Machine Learning<\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023 (<strong>Q2, IF=4.2<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2096720923000465?via%3Dihub\"><strong>Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset <\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4, 2023 (<strong>Q1, IF=2.5<\/strong>)<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404822002243?dgcid=rss_sd_all\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Robust stacking ensemble model for darknet traffic classification under adversarial settings<\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Hardhik&nbsp;Mohanty,&nbsp;Arousha Haghighian&nbsp;Roudsari, and Arash Habibi Lashkari, Computers &amp; Security Journal, Vol. 120, 2022 (<strong>Q1, IF=5.6<\/strong>)<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2949715923000793?via%3Dihub\"><strong>A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms, and challenges<\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, Vol. 2, Issue 6, 2023 <strong>(Q2, IF=2.2<\/strong>)<\/p>\n\n\n\n<p style=\"font-size:14px\"><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p style=\"font-size:14px\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00790-z\"><strong>Detection, Characterization, and Profiling DOH Malicious Traffic Using Statistical Pattern Recognition <\/strong><\/a><\/p>\n\n\n\n<p style=\"font-size:14px\">Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, 2023 (<strong>Q1, IF=3.22<\/strong>)<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ To tackle the challenge of strengthening cybersecurity resiliency on a broader scale, it is vital to collaborate with the industry and use innovative research methods to develop efficient and relevant tools while promoting [&hellip;]<\/p>\n","protected":false},"author":1159,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"tags":[11,8,10,12,13,9],"class_list":["post-359","page","type-page","status-publish","hentry","tag-articles","tag-behaviour-centric-cybersecurity-center-bccc","tag-book","tag-everyone","tag-public","tag-publications"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Behaviour-Centric Cybersecurity Center (BCCC)<\/title>\n<meta name=\"description\" content=\"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/research\/bccc\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"og:description\" content=\"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T17:45:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"589\" \/>\n\t<meta property=\"og:image:height\" content=\"929\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/\",\"name\":\"Publications - Behaviour-Centric Cybersecurity Center (BCCC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2026\\\/02\\\/UCVC.png\",\"datePublished\":\"2023-05-11T13:23:38+00:00\",\"dateModified\":\"2026-04-16T17:45:46+00:00\",\"description\":\"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2026\\\/02\\\/UCVC.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2026\\\/02\\\/UCVC.png\",\"width\":589,\"height\":929},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\",\"name\":\"Behaviour-Centric Cybersecurity Center (BCCC)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Behaviour-Centric Cybersecurity Center (BCCC)","description":"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Behaviour-Centric Cybersecurity Center (BCCC)","og_description":"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.","og_url":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/","og_site_name":"Behaviour-Centric Cybersecurity Center (BCCC)","article_modified_time":"2026-04-16T17:45:46+00:00","og_image":[{"width":589,"height":929,"url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/","url":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/","name":"Publications - Behaviour-Centric Cybersecurity Center (BCCC)","isPartOf":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/#primaryimage"},"image":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png","datePublished":"2023-05-11T13:23:38+00:00","dateModified":"2026-04-16T17:45:46+00:00","description":"To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness.","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/research\/bccc\/publications\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/#primaryimage","url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png","contentUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/UCVC.png","width":589,"height":929},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/research\/bccc\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/research\/bccc\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website","url":"https:\/\/www.yorku.ca\/research\/bccc\/","name":"Behaviour-Centric Cybersecurity Center (BCCC)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/research\/bccc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"}]}},"taxonomy_info":{"post_tag":[{"value":11,"label":"Articles"},{"value":8,"label":"Behaviour-Centric Cybersecurity Center (BCCC)"},{"value":10,"label":"Book"},{"value":12,"label":"Everyone"},{"value":13,"label":"Public"},{"value":9,"label":"Publications"}]},"featured_image_src_large":false,"author_info":{"display_name":"ahabibil","author_link":"https:\/\/www.yorku.ca\/research\/bccc\/author\/ahabibil\/"},"comment_info":"","_links":{"self":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/users\/1159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":240,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/359\/revisions"}],"predecessor-version":[{"id":3559,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/359\/revisions\/3559"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}