Books:
Understanding Cybersecurity Management in Healthcare: Challenges, Strategies, and Trends, ISBN: 978-3-031-68033-5, Canada, 2024
Understanding Cybersecurity on Smartphones: Challenges, Strategies, and Trends, ISBN: 978-3-031-48864-1, Canada, 2023
Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective , ISBN: 978-3-030-88703-2, Canada, 2022
Understanding Cybersecurity Management in Decentralized Finance, ISBN: 978-3-031-23340-1, Canada, 2022
Understanding Cybersecurity Law and Digital Privacy, DOI: 978-3-030-88704-9, Canada, 2021
Understanding Cybersecurity Management in FinTech , DOI: 978-3-030-79915-1, Canada, 2021
Mobile Operating systems and Programming , ISBN: 978-3-639-36917-5, Germany, 2011
Graphical User Authentication (GUA) , ISBN: 978-3-8433-8072-0, Germany, 2011
PATENTS:
- “US 2020/0244693 A1:” Systems and Methods for Cybersecurity Risk Assessment of Users of a Computer Network”, Submitted 2018, Published Jul 2020
Book chapters:
- “Understanding Cybersecurity Risk in FMI using HPC“, Gurdip Kaur, Ziba Habibi Lashkari and Arash Habibi Lashkari, Cybersecurity & High-Performance Computing Environments, Taylor & Francis (Under publication process), 2021
- “Information Technology Risk Management“, Gurdip Kaur and Arash Habibi Lashkari, Advances in Cybersecurity Management, Springer, pp 269-287, https://doi.org/10.1007/978-3-030-71381-2_13
- “An Introduction to Security Operations“, Gurdip Kaur and Arash Habibi Lashkari, Advances in Cybersecurity Management, Springer, pp 463-481, https://doi.org/10.1007/978-3-030-71381-2_21
ARTICLES:
124. “NLFlowLyzer: Toward generating an intrusion detection dataset and intruders behavior profiling through network layer traffic analysis and pattern extraction,” MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computers & Security, 2024, 104160, ISSN 0167-4048
123. “Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis”, MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Volume 118, Part B, September 2024
122. “Toward Generating a New Cloud-based Distributed Denial of Service (DDoS) Dataset and Intrusion Traffic Characterization”, MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo, Information, Vol 15(3), 131, (2024)
121. “Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey”, Xie He, Nikhill Vombatkere, Arash Habibi Lashkari, Dilli Prasad Sharma, Information, Vol 15(3), 131, 2024
120. “Intruders behavior Unveiled: Toward Generating an Intrusion Detection Dataset and Intruders Behavioral Profiling using Network Layer Traffic Characterization”, MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, International Journal of Information Security, 2024
119. “Identifying Malware Packers Through Multi-layer Feature Engineering in Static Analysis”, Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, Information Security and Privacy, Vol. 15, 2024
118. “Implementation of a Trust-Based Framework for Substation Defense in the Smart Grid”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, Smart Cities, Vol. 7 (1), 99-140, 2023
117. “A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges”, Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, 2023
116. “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023
115. “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset“, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023
114. “Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning“, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023
113. “Detection, Characterization and Profiling DOH Malicious Traffic UsingStatistical Pattern Recognition”, Sepideh Niktabe, Arash Habibi Lashkari, Dilli Sharma, International Journal of Information Security, Vol. 22, 2023
112. “IoT Malware: An Attribute-based Taxonomy, Detection Mechanisms and Challenges”, Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023
111. “”A survey on run-time packers and mitigation techniques”, Ehab Mufid Shafiq Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, International Journal of Information Security, Vol. 22, 2023
110. “A Gradient-based Approach for Adversarial Attack on Deep Learning-based Network Intrusion Detection Systems”, Hesamodin Mohammadian, Ali Ghorbani, Arash Habibi Lashkari, Applied Soft Computing, Vol. 137, 2023
109. “IoT Malware Analysis Using Federated Learning: A Comprehensive Survey”, Madumitha Venkatasubramanian, Arash Habibi Lashkari, and Saqib Hakak, IEEE Access, Vol. 11, 2023
108. “Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, 20th International Conference on Privacy, Security, and Trust (PST2023), 2023
107. “An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation”, Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC, USA
106. “Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics“, Ashley Barkworth, Rehnuma Tabassum and Arash Habibi Lashkari, 12th International Conference on Communication and Network Security (ICCNS12), China
105. “Robust Stacking Ensemble Model For Darknet Traffic Classification Under Adversarial Settings”, Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Lashkari, Computers & Security, Vol 120, 2022
104. “QKeyShield: A practical receiver-device-independent entanglement-swapping-based quantum key distribution“, Mohammaed Aldarwbi, Ali Ghorbani, and Arash Habibi Lashkari, IEEE Access, 2022
103. “The Sound of Intrusion: A Novel Network Intrusion Detection System”, Mohammaed Aldarwbi, Arash Habibi Lashkari, and Ali Ghorbani, Computers and Electrical Engineering, Vol 130, 2022
102. “A Trust-Influenced Smart Grid: A Survey and A Proposal”, Kwasi Boakye-Boateng, Ali Ghorbani, and Arash Lashkari, Journal of Sensor and Actuator Networks, 11(3), 34, 2022
101. “Memory Forensics Tools: A Comparative Analysis”, Mahdi Daghmehchi Firoozjaeia, Arash Habibi Lashkari, and Ali A. Ghorbanic, Journal of Cyber Security Technology, Volume 6, 2022
100. “Detecting Obfuscated Malware using Memory Feature Engineering”, Tristan Carrier , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
99. “Evaluating Deep Learning-based NIDS in Adversarial Settings”, Hesamodin Mohammadian , Arash Habibi Lashkari and Ali A. Ghorbani, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
98. “PDF Malware Detection based on Stacking Learning”, Maryam Issakhani , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
97. “A memory-based game-theoretic defensive approach for digital forensic investigators”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani, Forensic Science International: Digital Investigation, Volume 38, 2021
96. “Towards Query-efficient Black-box Adversarial Attack on Text Classification Models”, Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
95. “A Novel Trust Model in Detecting Final-Phase Attacks in Substations”, Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
94. “User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security”, Farzaneh Shoeleh, Masoud Erfani, Saeed Shafeiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
93. “Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management”, Dilli P. Sharma, Barjinder Kaur, Farzaneh Shoeleh, Masoud Erfani, Duc-Phong Le, Arash Habibi Lashkari, Ali A. Ghorbani, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2021), 2021, Athens, Greece.
92. “Lightweight Hybrid Data Exfiltration using DNS based on Machine Learning”, Samaneh Mahdavifar, Amgad Hanafy Salem, Princy Victor, Miguel Garzon, Amir H. Razavi, Natasha Hellberg, Arash Habibi Lashkari, The 11th IEEE International Conference on Communication and Network Security (ICCNS), Dec. 3-5, 2021, Beijing Jiaotong University, Weihai, China.
91. “Classifying Malicious Domains using DNS Traffic Analysis”, Samaneh Mahdavifar, Nasim Maleki, Arash Habibi Lashkari, Matt Broda, Amir H. Razavi, The 19th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC), Oct. 25-28, 2021, Calgary, Canada
90. “EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics”, David Sean Keyes, Beiqi Li, Gurdip Kaur, Arash Habibi Lashkari, Francois Gagnon, Fred´ eric Massicotte, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada
89. “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering”, Arash Habibi Lashkari, Beiqi Li, Tristan Lucas Carrier, Gurdip Kaur, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada
88. “A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents’ behaviour”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari and Ali A. Ghorbani, Forensic Science International: Digital Investigation, vol 35, pages 301024, 2020
87. “KeyShield: A scalable and quantum-safe key management scheme”, A Mohammed Y., AA Ghorbani, A Habibi Lashkari, IEEE Open Journal of the Communications Society, December 2020
86. “Classifying and clustering malicious advertisement uniform resource locators using deep learning”, Xichen Zhang, Arash Habibi Lashkari, Ali Ghorbani, Computational Intelligence, Wiley, September 2020
85. “A game-theoretic defensive approach for forensic investigators against rootkits”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A.Ghorbani, Forensic Science International: Digital Investigation, Volume 32, March 2020
84. “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning”, Arash Habibi Lashkari, Gurdip Kaur, Abir Rahal, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020
83. “DIDroid:Android Malware Classification and Characterization Using Deep Image Learning”, Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, Francois Gagnon, Frédéric Massicotte, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020
82. “Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic”, Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur and Arash Habibi Lashkari, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020
81. “Intrusion Traffic Detection and Characterization using Deep Image Learning”, Gurdip Kaur, Arash Habibi Lashkari and Abir Rahali, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020
80. “Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls”, Laya Taheri, Andi Fitriah Abdulkadir, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019
79. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy”, Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019
78. “Securing GOOSE: The Return of One-Time Pads”, Kwasi Boakye, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019
77. “An Evaluation Framework For Network Security Visualizations”, Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani, Computers & Security, Volume 84, July 2019, Pages 70-92
76. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy”, Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019, Pages 70-92
75. “Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network”, Xichen Zhang, Arash Habibi Lashkari, Nasim Maleki, Joseph F. Mudge, Ali A. Ghorbani, Computers & Security, The 2019 International Conference on Security and Management (SAM2019), USA
74. “A Survey on User Profiling Models for Anomaly Detection in Cyberspace”,Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani, Journal of Cyber Security and Mobility, Vol 2, 2018
73. “Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification, Arash Habibi Lashkari, Laya Taheri, Andi Fitriah, Ali Ghorbani, Proceeding of the IEEE ICCST’18, Montreal, Quebec, Oct. 2018
72. “The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali Ghorbani, Proceeding of the IEEE ICCST’18, Montreal, Quebec, Oct. 2018
71. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, 4th International Conference on Information Systems Security and Privacy (ICISSP), Purtogal, January 2018
70. “Towards a Reliable Intrusion Detection Benchmark Dataset”, Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari and Ali A. Ghorbani, Software Networking, Vol 2017, Issue:1, pp 177-200, January 2018
69. “Towards a Network-Based Framework for Android Malware Detection and Characterization”, Arash Habibi Lashkari, Andi Fitriah A.Kadir, Hugo Gonzalez, Kenneth Fon Mbah and Ali A. Ghorbani, In the proceeding of the 15th International Conference on Privacy, Security and Trust, PST, Calgary, Canada, 2017
68. “A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection”, Arash Habibi Lashkari, Gerard Draper Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani, 7th International Conference on Communication and Network Security (ICCNS 2017), Tokyo, Japan, 2017
67. “A Phishing Email Detection Approach Using Machine Learning Techniques”, Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani, The World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Vol:4, No:1
66. “Characterization of Tor Traffic Using Time Based Features”, Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun and Ali A. Ghorbani, In the proceeding of the 3rd International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal
65. “Detecting Malicious URLs Using Lexical Analysis”, Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani, NSS16, 467-482
64. “An Evaluation Framework for Intrusion Detection Dataset”, Amirhossein Gharib, Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, International Conference on Information Science and Security (ICISS), IEEE, Thailand
63. “Characterization of Encrypted and VPN Traffic Using Time-Related Features”, Gerard Drapper Gil, Arash Habibi Lashkari, Mohammad Mamun, Ali A. Ghorbani, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy(ICISSP 2016) , pages 407-414, Rome , Italy
62. “Cloud Computing Data Center Adoption Factors Validity by Fuzzy AHP”, Nasrin Badie, AB Razak CHE Hussin, Arash Habibi Lashkari, International Journal of Computational Intelligence Systems, Vol. 8, No. 5: 854-873.
61. “Novel Security Conscious Evaluation Criteria for Web Service Composition Research journal of Applied Science”, Homa Movahednejad, Suhaimi BIN Ibrahim, Mahdi Sharifi, Harihodin BIN Salamat, Arash Habibi Lashkari and Sayed Gholam Hassan Tabatabaei, Engineering and Technology, Vol. 7 , No. 4, 673-695.
60. “QoS-aware Evaluation Criteria for Web Service Composition”, Homa Movahednejad, Suhaimi Bin Ibrahim, Mahdi Sharifi, Harihodin Bin Salamat, Arash Habibi Lashkari and Sayad Gholam Hassan Tabatabaei, Journal of Theoretical and Applied Information Technology, Vol. 59, No. 1, 27-44.
59. “A New Graphical Password Based on Decoy Image Portions (GP-DIP)”, Mohsin R. Albayati, Arash Habibi Lashkari, The 2014 International Conference Applied Mathematics, Computational Science & Engineering (AMCSE), Bulgaria.
58. “Pass-Coob a New Graphical Password Based Oncolors And Objects”, Ahmad Z. El-Rufai, Arash Habibi Lashkari, International Conference on Advances in Information Processing and Communication Technology (IPCT), Italy.
57. “An Efficient Load Balancing Algorithm for Virtualized Cloud Data Centres”, Ali Naser Abdulhussein Abdulhussein, Atwine Mugume Twinamatsiko, Jugal Harshvadan Joshi, Arash Habibi Lashkari, Mohammad Sadeghi, The International Conference on Circuits, Systems, Signal Processing, Communications and Computers (CSSCC), Italy.
56. “Tri-Pass: A New Graphical User Authentication Scheme”, Elmira Yesseyeva, Kanat Yesseyev, Mustafa M. Abdulrazaq, Arash Habibi Lashkari, Mohammad Sadeghi, International Journal of Circuits, Systems and Signal Processing, Bulgaria.
55. “An Enhanced Quality Model For Iaas Provider With Non-Quantifiable Key Performance Indicators”, Jugal Harshvadan Joshi, Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Arash Habibi Lashkari, Mohammad Sadeghi, 3rd International Conference on Information Computer Application (ICICA), Barcelona, Spain.
54. “Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems”, Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Jugal Harshvadan Joshi, Arash Habibi Lashkari and Mohammad Sadeghi, IJCSI Journal, Vol 10, Issue 6.
53. “A New Evaluation Criteria for Effective Security Awareness in Computerrisk Management Based on AHP”, Nasrin Badie, Arash Habibi Lashkari, Journal of Basic and Applied scientific Research, Vol. 2, No. 9, 9331-9347.
52. “Graphical Password Security Evaluation Criteria by Fuzzy Analytical Hierarchical Process”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, ISI Journal of Basic and Applied Scientific Research (JBAS).
51. “Mobile Wifi-Based Indoor Positioning System”, Mike Ng Ah Ngan, Mohammed Abdul Karim, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 10 No. 3, USA.
50. “Mobile Edutainment Application for Children Brain Development and Logical Thinking”, Behrang Parhizkar, Ali Garba Garba Bade Aliyu Musa, Zahra Mohana Gebril, Anand Ramachandran, Arash Habibi Lashkari, Ireland International Conference On Education (IICE), Ireland.
49. “Web-Based Ar Advertising & Branding For Proton Company”, Ashraf Abbas M. Al-Modwahi, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 2.
48. “Android Mobile Augmented Reality Application Based on Different Learning Theories for Primary School Children”, Behrang Parhizkar, Waqas Khalid Obeidy, Shahan Ahmad Chouwdhary, Zahra Mohana Gebril, Mike Ng Ah Ngan, Arash Habibi Lashkari, International Conference on Multimedia Computing and Systems (ICMCS), Tangier, Morocco.
47. “Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory”, Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A.Tahir, Behrang Parhizkar, Anand Ramachandran, Arash Habibi Lashkari, The Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Published by Springer, India.
46. “A Secure Recognition Based Graphical Password By Watermarking”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, 11th IEEE International Conference on Computer and Information Technology, Cyprus.
45. “A Survey on Image Steganography Algorithms and Evaluation”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud, The International Conference on Digital Information Processing and Communications (ICDIPC), Publish by Springer, Czech Republic.
44. “Awareness for the Protection of Endangered Species with Augmented Reality”, Behrang Parhizkar, Koh Boon San, Arash Habibi Lashkari;, International Conference on Computer Design and Engineering (ICCDE), Kuala Lumpur, Malaysia.
43. “Theoretical Model for Automating Students”, Seyed Mostafa Hosseini, Denis Bantariza, Mohammed M I Awad, Behrang Parhizkar, Arash Habibi Lashkari, Services in Universities, 3rd International Conference on Machine Learning and Computing (ICMIC), Singapore.
42. “Privacy and Vulnerability Issues of Social Networks (Facebook)”, Anand Ramachandran, Behrang Parhizkar , Sujata Navaratnam, Arash Habibi Lashkari, International Conference on Internet Technology and Security (ITS), Ei Compendex and Thamson ISI Indexing , China.
41. “Challenges Of Software Development”, Yasaman Talaei Rad, Hamed Esfandiari, Behrang Parhizkar, Arash Habibi Lashkari, 3rd International Conference on Machine Learning and Computing (ICMLC), Singapore.
40. “Wired and Wireless Food Ordering Model for Universities Supported by Web Services”, Mohammed M I Awad, Moses Busumu, Behrang Parhizkar, Yap Sing Nian, Arash Habibi Lashkari International Journal of Computer and Network Security (IJCNS), Austria.
39. “A Survey on Web-Based AR Applications”, Behrang Parhizkar,Ashraf Abbas M. Al-Modwahi,Mohammad Mehdi Bartaripou, Hossein Reza Babae, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSIS), Vol. 8, Issue 4.
38. “Mobile Phone Augmented Reality Business Card”, Edmund Ng Giap Wen, Teo Tzong Ren, Behrang Parhizkar, Arash Habibi Lashkari International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.
37. Augmented Reality for Museum Artifacts Visualization”, Edmund Ng Giap Wen, Lina Chai Hsiao Ping, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.
36. “Wi-Fi Based Indoor Positioning System”, Mike Ng Ah Ngan, Behrang Parhizkar, Mohamed Abdulkarim Mohamedali, Edmund Ng Giap Wen, Arash Habibi Lashkari, International Journal of Computer Science And Network Security (IJCSNS) Vol. 10, No. 9, Korea.
35. “Users’ Perceptions on Mobile Devices Security Awareness In Malaysia”, Ahmed Sabeeh, Arash Habibi Lashkari, The 6th International Conference for Internet Technology and Secured Transactions (ICITST), UAE.
34. “Facial Expresion Recognition Based on Improved Eigen Face Detection Algorithm With Visual Control”, Behrang Parhizkar, Muazunasirudanmaliki, Zahra Mohana Gebril, Arash Habibi Lashkari; International Conference on Computer And Computational Intelligence (ICCCI), Thailand.
33. “Mobile Reservation in Leisure, Hospitality and Transport Industry”, Behrang Parhizkar, Bashir Abdu Muzakkari, Noris Ismail, Sundresan S/O Perumal, Arash Habibi Lashkari, International Conference on Communication Engineering and Networks (ICCEN), Hong Kong.
32. “A Wide Survey on Botnet”, Seyedeh Ghazal Ghalebandi, Mohammad Reza Moradhaseli, Arash Habibi Lashkari, The International Conference on Digital Information and Communication Technology and Its Applications (DICTAP), Publish by Springer, French.
31. “A Survey on P2P Botnets Detection”, Seyedeh Ghazal Ghalebandi, Rafidah Binti Md Noor, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN 2011), Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.
30. “A Survey on Wireless Security Protocols Wi-Fi (802.11) and Wimax (802.16)”, Amirreza Saba, Shahab Alizadeh, Mahdi Khazaei, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN), Asme Digital Library, Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.
29. “Augmented Reality Children Storybook (ARCS)”, Behrang Parhizkar, Tan Yi Shin, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore.
28. “Augmented Reality Logo Analyzer (ARELA)”, Behrang Parhizkar, Chicco Mokhe, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore
27. “Intelligent Online Document Classification System Using Neural Network”, Behrang Parhizkar, Prasanna Kumari Jaya Kumar, Anand Ramachandran, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), USA.
26. “A New Exam Management System Based on Semi-Automated Answer Checking System”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.
25. “Appliance Mobile Positioning System (AMPS) (An Advanced Mobile Application)”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.
24. “Intelligent Online Course Evaluation System Using Nlp Approach”, International Journal of Computer and Network Security (IJCNS), Austria, Vol. 2, No.7 2010
23. “Simulation of Investigating the Earth and Universe Using Interactive Mobile Augmented Reality Based on Smart Evaluation”, International Conference on Imaging Engineering (ICIE 12), Hong Kong.
22. “Augmented Reality Children Storybook (ARCS)”, International Conference on Future Information Technology (ICFIT), Singapore.
21. “Augmented Reality Logo Analyzer (ARELA)”, International Conference on Future Information Technology (ICFIT), Singapore.
20. “A Survey On Dynamic Honeypots”, International Conference on Network Communication and Computer (ICNCC), New Delhi, India.
19. “Preserving Anonymity of Users Identity in Social Network Sites Using Integrated Algorithm”, International Conference on Information Security and Artificial Intelligence, China.
18. “Augmented Reality Tourist Catalogue Using Mobile Technology”, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICCRD. 2010
17. “Wireless Communications Technologies for Energy Networks in A Non-Industrialized Society”, ICCTD, Cairo, Egypt.
16. “Pc 2 Phone Event Announcer”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 5, USA.
15. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.
14. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.
13. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.
12. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.
11. “A Survey on Bandwidth Allocation Methods in Optical Networks” , Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, International Journal of Computer Theory and Engineering (IJCTE), Singapore.
10. “A Complete Comparison on Pure and Cued Recall Based Graphical User Authentication”, Arash Habibi Lashkari, Rosli Saleh, Farnaz Towhidi, Samaneh Farmand, Publish by IEEE Computer Society and Thamson ISI Indexing, Dubai, ICCEE.
9. “QDP Authentication System Over Kerberos”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Ahmed A. Sabeeh, Amirreza Saba; Publish by Ieee Computer Society and Thamson ISI Indexing, Dubai, ICCEE.
8. “Windows-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
7. “Router-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Shahram Jazayeri, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
6. “Static Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Hossein Rouhani Zeidanloo, Ahmed A. Sabeeh, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
5. “A Survey on Wireless Security Protocols (Wep, Wpa and Wpa2/802.11i)”, Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi, Publish by IEEE Computer Society and Thamson ISI Indexing, China, ICCSIT.
4. “Wired Equivalent Privacy (WEP) Versus Wi-Fi Protected Access (WPA)”, Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh;, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICCDA.
3. “Wired Equivalent Privacy (WEP)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.
2. “Binary Decision Diagram (BDD)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.
1. “A Boolean Model in Information Retrieval for Search Engines”, Arash Habibi Lashkari, Fereshteh Mahdavi, Vahid Ghomi, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICMIE.
Workshops:
Cybersecurity Data Repository Talk Series, ATLANTIC CANADA TECH TALK – SAINT JOHN, NB (Feb 12th, 12:00 PM) Canada2020
Cybersecurity Data Repository Talk Series, Mount Alisson University, Sackville, NB (Jan 23rd, 2:30 pm) Canada2020
Cybersecurity Data Repository Talk Series, UNB Saint John Campus, Saint John, NB (Nov 22nd, 2:30 pm) Canada2019
Cybersecurity Awareness Workshop Series (Industry Managers), City of Saint John, Municipality, Saint John, NB, Canada (Sep 09-30, 2019) Canada2019
Cybersecurity Awareness Workshop Series, ACOA Team, Atlantic, NB (Nov 26-27, 2018) Canada2018
Cybersecurity Awareness Workshop Series (Industry Managers), TD Bank, Toronto, ON (Nov 01-02, 2018) Canada2018
Cybersecurity 101 Workshop Series (Industry Managers), CIC/UNB, Fredericton, NB (Aug 13-16, 2018) Canada2018
Research and Innovation Workshop Series, Bibliography (Postgraduate students), 03/07/2014-03/07/2014 Malaysia2014
Research and Innovation Workshop Series, Research (Postgraduate students), 02/26/2014-02/28/2014 Malaysia2014
Research Methodology, Research and Publication (Lecturers and Researchers), 02/18/2014-02/18/2014 Malaysia2014
ICT Certificates for Industries, (Postgraduate students), 12/14/2012-12/14/2012 Malaysia2012
Curriculum Vitae, (Postgraduate students): 12/13/2012-12/13/2012 Malaysia2012
Research and Innovation Workshop Series, (Postgraduate students) 10/02/2012-11/23/2012 Malaysia2012
Packet Tracer Simulator, (Cisco Based), 08/02/2012-08/23/2012 Malaysia2012
Research and Publication, (Undergraduate students), 07/03/2012-07/24/2012 Malaysia2012
Packet Tracer Simulator, (Cisco Based): 06/05/2012-06/19/2012 Malaysia2012
Research Methodology, (Postgraduate students), 05/19/2012-05/19/2012 Malaysia2012
Conference and Journal Publications, (Postgraduate Students), 03/06/2012-03/20/2012 Malaysia2012
Research Methodology, (Research and Publication), 08/04/2011-08/25/2011 Malaysia2011
Packet Tracer Simulator, (Cisco Based) 06/03/2011-06/24/2011 Malaysia2011
Research Methodology, (Research and Publication), 08/11/2010-08/11/2010 Malaysia2011
Packet Tracer Simulator, (Cisco Based), 08/09/2010-08/10/2010 Malaysia2011