Skip to main content Skip to local navigation
Home » Publications

Publications

PATENTS:

  • US 2020/0244693 A1:” Systems and Methods for Cybersecurity Risk Assessment of Users of a Computer Network”, Submitted 2018, Published Jul 2020

Book chapters:

  • Information Technology Risk Management“, Gurdip Kaur and Arash Habibi Lashkari, Advances in Cybersecurity Management, Springer, pp 269-287, https://doi.org/10.1007/978-3-030-71381-2_13
  • An Introduction to Security Operations“, Gurdip Kaur and Arash Habibi Lashkari, Advances in Cybersecurity Management, Springer, pp 463-481, https://doi.org/10.1007/978-3-030-71381-2_21

ARTICLES:

124. “NLFlowLyzer: Toward generating an intrusion detection dataset and intruders behavior profiling through network layer traffic analysis and pattern extraction,” MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computers & Security, 2024, 104160, ISSN 0167-4048

123. “Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis”, MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Volume 118, Part B, September 2024

122. “Toward Generating a New Cloud-based Distributed Denial of Service (DDoS) Dataset and Intrusion Traffic Characterization”, MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo, Information, Vol 15(3), 131, (2024)

121. “Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey”, Xie He, Nikhill Vombatkere, Arash Habibi Lashkari, Dilli Prasad Sharma, Information, Vol 15(3), 131, 2024

120. “Intruders behavior Unveiled: Toward Generating an Intrusion Detection Dataset and Intruders Behavioral Profiling using Network Layer Traffic Characterization”, MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, International Journal of Information Security, 2024

119. “Identifying Malware Packers Through Multi-layer Feature Engineering in Static Analysis”, Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, Information Security and Privacy, Vol. 15, 2024

118. “Implementation of a Trust-Based Framework for Substation Defense in the Smart Grid”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, Smart Cities, Vol. 7 (1), 99-140, 2023

117. “A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges”, Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, 2023

116. “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023

115. “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset“, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023

114. “Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning“, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023

113. “Detection, Characterization and Profiling DOH Malicious Traffic UsingStatistical Pattern Recognition”, Sepideh Niktabe, Arash Habibi Lashkari, Dilli Sharma, International Journal of Information Security, Vol. 22, 2023

112. “IoT Malware: An Attribute-based Taxonomy, Detection Mechanisms and Challenges”, Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023

111. “”A survey on run-time packers and mitigation techniques”, Ehab Mufid Shafiq Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, International Journal of Information Security, Vol. 22, 2023

110. “A Gradient-based Approach for Adversarial Attack on Deep Learning-based Network Intrusion Detection Systems”, Hesamodin Mohammadian, Ali Ghorbani, Arash Habibi Lashkari, Applied Soft Computing, Vol. 137, 2023

109. “IoT Malware Analysis Using Federated Learning: A Comprehensive Survey”, Madumitha Venkatasubramanian, Arash Habibi Lashkari, and Saqib Hakak, IEEE Access, Vol. 11, 2023

108. “Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, 20th International Conference on Privacy, Security, and Trust (PST2023), 2023

107. “An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation”, Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC, USA

106. “Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics“, Ashley Barkworth, Rehnuma Tabassum and Arash Habibi Lashkari, 12th International Conference on Communication and Network Security (ICCNS12), China

105. “Robust Stacking Ensemble Model For Darknet Traffic Classification Under Adversarial Settings”, Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Lashkari, Computers & Security, Vol 120, 2022

104. “QKeyShield: A practical receiver-device-independent entanglement-swapping-based quantum key distribution“, Mohammaed Aldarwbi, Ali Ghorbani, and Arash Habibi Lashkari, IEEE Access, 2022

103. “The Sound of Intrusion: A Novel Network Intrusion Detection System”, Mohammaed Aldarwbi, Arash Habibi Lashkari, and Ali Ghorbani, Computers and Electrical Engineering, Vol 130, 2022

102. “A Trust-Influenced Smart Grid: A Survey and A Proposal”, Kwasi Boakye-Boateng, Ali Ghorbani, and Arash Lashkari, Journal of Sensor and Actuator Networks, 11(3), 34, 2022

101. “Memory Forensics Tools: A Comparative Analysis”, Mahdi Daghmehchi Firoozjaeia, Arash Habibi Lashkari, and Ali A. Ghorbanic, Journal of Cyber Security Technology, Volume 6, 2022

100. “Detecting Obfuscated Malware using Memory Feature Engineering”, Tristan Carrier , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022

99. “Evaluating Deep Learning-based NIDS in Adversarial Settings”, Hesamodin Mohammadian , Arash Habibi Lashkari and Ali A. Ghorbani, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022

98. “PDF Malware Detection based on Stacking Learning”, Maryam Issakhani , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022

97. “A memory-based game-theoretic defensive approach for digital forensic investigators”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani, Forensic Science International: Digital Investigation, Volume 38, 2021

96. “Towards Query-efficient Black-box Adversarial Attack on Text Classification Models”, Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.

95. “A Novel Trust Model in Detecting Final-Phase Attacks in Substations”, Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.

94. “User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security”, Farzaneh Shoeleh, Masoud Erfani, Saeed Shafeiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.

93. “Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management”, Dilli P. Sharma, Barjinder Kaur, Farzaneh Shoeleh, Masoud Erfani, Duc-Phong Le, Arash Habibi Lashkari, Ali A. Ghorbani, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2021), 2021, Athens, Greece.

92. “Lightweight Hybrid Data Exfiltration using DNS based on Machine Learning”, Samaneh Mahdavifar, Amgad Hanafy Salem, Princy Victor, Miguel Garzon, Amir H. Razavi, Natasha Hellberg, Arash Habibi Lashkari, The 11th IEEE International Conference on Communication and Network Security (ICCNS), Dec. 3-5, 2021, Beijing Jiaotong University, Weihai, China.

91. “Classifying Malicious Domains using DNS Traffic Analysis”, Samaneh Mahdavifar, Nasim Maleki, Arash Habibi Lashkari, Matt Broda, Amir H. Razavi, The 19th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC), Oct. 25-28, 2021, Calgary, Canada

90. “EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics”, David Sean Keyes, Beiqi Li, Gurdip Kaur, Arash Habibi Lashkari, Francois Gagnon, Fred´ eric Massicotte, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada

89. “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering”, Arash Habibi Lashkari, Beiqi Li, Tristan Lucas Carrier, Gurdip Kaur, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada

88. “A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents’ behaviour”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari and Ali A. Ghorbani, Forensic Science International: Digital Investigation, vol 35, pages 301024, 2020

87. “KeyShield: A scalable and quantum-safe key management scheme”, A Mohammed Y., AA Ghorbani, A Habibi Lashkari, IEEE Open Journal of the Communications Society, December 2020

86. “Classifying and clustering malicious advertisement uniform resource locators using deep learning”, Xichen Zhang, Arash Habibi Lashkari, Ali Ghorbani, Computational Intelligence, Wiley, September 2020

85. “A game-theoretic defensive approach for forensic investigators against rootkits”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A.Ghorbani, Forensic Science International: Digital Investigation, Volume 32, March 2020

84. “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning”, Arash Habibi Lashkari, Gurdip Kaur, Abir Rahal, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020

83. “DIDroid:Android Malware Classification and Characterization Using Deep Image Learning”, Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, Francois Gagnon, Frédéric Massicotte, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020

82. “Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic”, Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur and Arash Habibi Lashkari, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020

81. “Intrusion Traffic Detection and Characterization using Deep Image Learning”, Gurdip Kaur, Arash Habibi Lashkari and Abir Rahali, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020

80. “Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls”, Laya Taheri, Andi Fitriah Abdulkadir, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019

79. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy”, Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019

78. “Securing GOOSE: The Return of One-Time Pads”, Kwasi Boakye, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019

77. “An Evaluation Framework For Network Security Visualizations”, Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani, Computers & Security, Volume 84, July 2019, Pages 70-92

76. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy”, Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019, Pages 70-92

75. “Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network”, Xichen Zhang, Arash Habibi Lashkari, Nasim Maleki, Joseph F. Mudge, Ali A. Ghorbani, Computers & Security, The 2019 International Conference on Security and Management (SAM2019), USA

74. “A Survey on User Profiling Models for Anomaly Detection in Cyberspace”,Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani, Journal of Cyber Security and Mobility, Vol 2, 2018

73. “Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification, Arash Habibi Lashkari, Laya Taheri, Andi Fitriah, Ali Ghorbani, Proceeding of the IEEE ICCST’18, Montreal, Quebec, Oct. 2018

72. “The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals”, Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali Ghorbani, Proceeding of the IEEE ICCST’18, Montreal, Quebec, Oct. 2018

71. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization”, Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, 4th International Conference on Information Systems Security and Privacy (ICISSP), Purtogal, January 2018

70. “Towards a Reliable Intrusion Detection Benchmark Dataset”, Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari and Ali A. Ghorbani, Software Networking, Vol 2017, Issue:1, pp 177-200, January 2018

69. “Towards a Network-Based Framework for Android Malware Detection and Characterization”, Arash Habibi Lashkari, Andi Fitriah A.Kadir, Hugo Gonzalez, Kenneth Fon Mbah and Ali A. Ghorbani, In the proceeding of the 15th International Conference on Privacy, Security and Trust, PST, Calgary, Canada, 2017

68. “A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection”, Arash Habibi Lashkari, Gerard Draper Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani, 7th International Conference on Communication and Network Security (ICCNS 2017), Tokyo, Japan, 2017

67. “A Phishing Email Detection Approach Using Machine Learning Techniques”, Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani, The World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Vol:4, No:1

66. “Characterization of Tor Traffic Using Time Based Features”, Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun and Ali A. Ghorbani, In the proceeding of the 3rd International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal

65. “Detecting Malicious URLs Using Lexical Analysis”, Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani, NSS16, 467-482

64. “An Evaluation Framework for Intrusion Detection Dataset”, Amirhossein Gharib, Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, International Conference on Information Science and Security (ICISS), IEEE, Thailand

63. “Characterization of Encrypted and VPN Traffic Using Time-Related Features”, Gerard Drapper Gil, Arash Habibi Lashkari, Mohammad Mamun, Ali A. Ghorbani, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy(ICISSP 2016) , pages 407-414, Rome , Italy

62. “Cloud Computing Data Center Adoption Factors Validity by Fuzzy AHP”, Nasrin Badie, AB Razak CHE Hussin, Arash Habibi Lashkari, International Journal of Computational Intelligence Systems, Vol. 8, No. 5: 854-873.

61. “Novel Security Conscious Evaluation Criteria for Web Service Composition Research journal of Applied Science”, Homa Movahednejad, Suhaimi BIN Ibrahim, Mahdi Sharifi, Harihodin BIN Salamat, Arash Habibi Lashkari and Sayed Gholam Hassan Tabatabaei, Engineering and Technology, Vol. 7 , No. 4, 673-695.

60. “QoS-aware Evaluation Criteria for Web Service Composition”, Homa Movahednejad, Suhaimi Bin Ibrahim, Mahdi Sharifi, Harihodin Bin Salamat, Arash Habibi Lashkari and Sayad Gholam Hassan Tabatabaei, Journal of Theoretical and Applied Information Technology, Vol. 59, No. 1, 27-44.

59. “A New Graphical Password Based on Decoy Image Portions (GP-DIP)”, Mohsin R. Albayati, Arash Habibi Lashkari, The 2014 International Conference Applied Mathematics, Computational Science & Engineering (AMCSE), Bulgaria.

58. “Pass-Coob a New Graphical Password Based Oncolors And Objects”, Ahmad Z. El-Rufai, Arash Habibi Lashkari, International Conference on Advances in Information Processing and Communication Technology (IPCT), Italy.

57. “An Efficient Load Balancing Algorithm for Virtualized Cloud Data Centres”, Ali Naser Abdulhussein Abdulhussein, Atwine Mugume Twinamatsiko, Jugal Harshvadan Joshi, Arash Habibi Lashkari, Mohammad Sadeghi, The International Conference on Circuits, Systems, Signal Processing, Communications and Computers (CSSCC), Italy.

56. “Tri-Pass: A New Graphical User Authentication Scheme”, Elmira Yesseyeva, Kanat Yesseyev, Mustafa M. Abdulrazaq, Arash Habibi Lashkari, Mohammad Sadeghi, International Journal of Circuits, Systems and Signal Processing, Bulgaria.

55. “An Enhanced Quality Model For Iaas Provider With Non-Quantifiable Key Performance Indicators”, Jugal Harshvadan Joshi, Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Arash Habibi Lashkari, Mohammad Sadeghi, 3rd International Conference on Information Computer Application (ICICA), Barcelona, Spain.

54. “Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems”, Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Jugal Harshvadan Joshi, Arash Habibi Lashkari and Mohammad Sadeghi, IJCSI Journal, Vol 10, Issue 6.

53. “A New Evaluation Criteria for Effective Security Awareness in Computerrisk Management Based on AHP”, Nasrin Badie, Arash Habibi Lashkari, Journal of Basic and Applied scientific Research, Vol. 2, No. 9, 9331-9347.

52. “Graphical Password Security Evaluation Criteria by Fuzzy Analytical Hierarchical Process”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, ISI Journal of Basic and Applied Scientific Research (JBAS).

51. “Mobile Wifi-Based Indoor Positioning System”, Mike Ng Ah Ngan, Mohammed Abdul Karim, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 10 No. 3, USA.

50. “Mobile Edutainment Application for Children Brain Development and Logical Thinking”, Behrang Parhizkar, Ali Garba Garba Bade Aliyu Musa, Zahra Mohana Gebril, Anand Ramachandran, Arash Habibi Lashkari, Ireland International Conference On Education (IICE), Ireland.

49. “Web-Based Ar Advertising & Branding For Proton Company”, Ashraf Abbas M. Al-Modwahi, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 2.

48. “Android Mobile Augmented Reality Application Based on Different Learning Theories for Primary School Children”, Behrang Parhizkar, Waqas Khalid Obeidy, Shahan Ahmad Chouwdhary, Zahra Mohana Gebril, Mike Ng Ah Ngan, Arash Habibi Lashkari, International Conference on Multimedia Computing and Systems (ICMCS), Tangier, Morocco.

47. “Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory”, Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A.Tahir, Behrang Parhizkar, Anand Ramachandran, Arash Habibi Lashkari, The Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Published by Springer, India.

46. “A Secure Recognition Based Graphical Password By Watermarking”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, 11th IEEE International Conference on Computer and Information Technology, Cyprus.

45. “A Survey on Image Steganography Algorithms and Evaluation”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud, The International Conference on Digital Information Processing and Communications (ICDIPC), Publish by Springer, Czech Republic.

44. “Awareness for the Protection of Endangered Species with Augmented Reality”, Behrang Parhizkar, Koh Boon San, Arash Habibi Lashkari;, International Conference on Computer Design and Engineering (ICCDE), Kuala Lumpur, Malaysia.

43. “Theoretical Model for Automating Students”, Seyed Mostafa Hosseini, Denis Bantariza, Mohammed M I Awad, Behrang Parhizkar, Arash Habibi Lashkari, Services in Universities, 3rd International Conference on Machine Learning and Computing (ICMIC), Singapore.

42. “Privacy and Vulnerability Issues of Social Networks (Facebook)”, Anand Ramachandran, Behrang Parhizkar , Sujata Navaratnam, Arash Habibi Lashkari, International Conference on Internet Technology and Security (ITS), Ei Compendex and Thamson ISI Indexing , China.

41. “Challenges Of Software Development”, Yasaman Talaei Rad, Hamed Esfandiari, Behrang Parhizkar, Arash Habibi Lashkari, 3rd International Conference on Machine Learning and Computing (ICMLC), Singapore.

40. “Wired and Wireless Food Ordering Model for Universities Supported by Web Services”, Mohammed M I Awad, Moses Busumu, Behrang Parhizkar, Yap Sing Nian, Arash Habibi Lashkari International Journal of Computer and Network Security (IJCNS), Austria.

39. “A Survey on Web-Based AR Applications”, Behrang Parhizkar,Ashraf Abbas M. Al-Modwahi,Mohammad Mehdi Bartaripou, Hossein Reza Babae, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSIS), Vol. 8, Issue 4.

38. “Mobile Phone Augmented Reality Business Card”, Edmund Ng Giap Wen, Teo Tzong Ren, Behrang Parhizkar, Arash Habibi Lashkari International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.

37. Augmented Reality for Museum Artifacts Visualization”, Edmund Ng Giap Wen, Lina Chai Hsiao Ping, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.

36. “Wi-Fi Based Indoor Positioning System”, Mike Ng Ah Ngan, Behrang Parhizkar, Mohamed Abdulkarim Mohamedali, Edmund Ng Giap Wen, Arash Habibi Lashkari, International Journal of Computer Science And Network Security (IJCSNS) Vol. 10, No. 9, Korea.

35. “Users’ Perceptions on Mobile Devices Security Awareness In Malaysia”, Ahmed Sabeeh, Arash Habibi Lashkari, The 6th International Conference for Internet Technology and Secured Transactions (ICITST), UAE.

34. “Facial Expresion Recognition Based on Improved Eigen Face Detection Algorithm With Visual Control”, Behrang Parhizkar, Muazunasirudanmaliki, Zahra Mohana Gebril, Arash Habibi Lashkari; International Conference on Computer And Computational Intelligence (ICCCI), Thailand.

33. “Mobile Reservation in Leisure, Hospitality and Transport Industry”, Behrang Parhizkar, Bashir Abdu Muzakkari, Noris Ismail, Sundresan S/O Perumal, Arash Habibi Lashkari, International Conference on Communication Engineering and Networks (ICCEN), Hong Kong.

32. “A Wide Survey on Botnet”, Seyedeh Ghazal Ghalebandi, Mohammad Reza Moradhaseli, Arash Habibi Lashkari, The International Conference on Digital Information and Communication Technology and Its Applications (DICTAP), Publish by Springer, French.

31. “A Survey on P2P Botnets Detection”, Seyedeh Ghazal Ghalebandi, Rafidah Binti Md Noor, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN 2011), Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.

30. “A Survey on Wireless Security Protocols Wi-Fi (802.11) and Wimax (802.16)”, Amirreza Saba, Shahab Alizadeh, Mahdi Khazaei, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN), Asme Digital Library, Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.

29. “Augmented Reality Children Storybook (ARCS)”, Behrang Parhizkar, Tan Yi Shin, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore.

28. “Augmented Reality Logo Analyzer (ARELA)”, Behrang Parhizkar, Chicco Mokhe, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore

27. “Intelligent Online Document Classification System Using Neural Network”, Behrang Parhizkar, Prasanna Kumari Jaya Kumar, Anand Ramachandran, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), USA.

26. “A New Exam Management System Based on Semi-Automated Answer Checking System”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.

25. “Appliance Mobile Positioning System (AMPS) (An Advanced Mobile Application)”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.

24. “Intelligent Online Course Evaluation System Using Nlp Approach”, International Journal of Computer and Network Security (IJCNS), Austria, Vol. 2, No.7 2010

23. “Simulation of Investigating the Earth and Universe Using Interactive Mobile Augmented Reality Based on Smart Evaluation”, International Conference on Imaging Engineering (ICIE 12), Hong Kong.

22. “Augmented Reality Children Storybook (ARCS)”, International Conference on Future Information Technology (ICFIT), Singapore.

21. “Augmented Reality Logo Analyzer (ARELA)”, International Conference on Future Information Technology (ICFIT), Singapore.

20. “A Survey On Dynamic Honeypots”, International Conference on Network Communication and Computer (ICNCC), New Delhi, India.

19. “Preserving Anonymity of Users Identity in Social Network Sites Using Integrated Algorithm”, International Conference on Information Security and Artificial Intelligence, China.

18. “Augmented Reality Tourist Catalogue Using Mobile Technology”, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICCRD. 2010

17. “Wireless Communications Technologies for Energy Networks in A Non-Industrialized Society”, ICCTD, Cairo, Egypt.

16. “Pc 2 Phone Event Announcer”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 5, USA.

15. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.

14. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.

13. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.

12. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.

11. “A Survey on Bandwidth Allocation Methods in Optical Networks” , Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, International Journal of Computer Theory and Engineering (IJCTE), Singapore.

10. “A Complete Comparison on Pure and Cued Recall Based Graphical User Authentication”, Arash Habibi Lashkari, Rosli Saleh, Farnaz Towhidi, Samaneh Farmand, Publish by IEEE Computer Society and Thamson ISI Indexing, Dubai, ICCEE.

9. “QDP Authentication System Over Kerberos”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Ahmed A. Sabeeh, Amirreza Saba; Publish by Ieee Computer Society and Thamson ISI Indexing, Dubai, ICCEE.

8. “Windows-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.

7. “Router-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Shahram Jazayeri, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.

6. “Static Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Hossein Rouhani Zeidanloo, Ahmed A. Sabeeh, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.

5. “A Survey on Wireless Security Protocols (Wep, Wpa and Wpa2/802.11i)”, Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi, Publish by IEEE Computer Society and Thamson ISI Indexing, China, ICCSIT.

4. “Wired Equivalent Privacy (WEP) Versus Wi-Fi Protected Access (WPA)”, Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh;, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICCDA.

3. “Wired Equivalent Privacy (WEP)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.

2. “Binary Decision Diagram (BDD)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.

1. “A Boolean Model in Information Retrieval for Search Engines”, Arash Habibi Lashkari, Fereshteh Mahdavi, Vahid Ghomi, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICMIE.

Workshops:

Cybersecurity Data Repository Talk Series, ATLANTIC CANADA TECH TALK – SAINT JOHN, NB (Feb 12th, 12:00 PM) Canada2020

Cybersecurity Data Repository Talk Series, Mount Alisson University, Sackville, NB (Jan 23rd, 2:30 pm) Canada2020

Cybersecurity Data Repository Talk Series, UNB Saint John Campus, Saint John, NB (Nov 22nd, 2:30 pm) Canada2019

Cybersecurity Awareness Workshop Series (Industry Managers), City of Saint John, Municipality, Saint John, NB, Canada (Sep 09-30, 2019) Canada2019

Cybersecurity Awareness Workshop Series, ACOA Team, Atlantic, NB (Nov 26-27, 2018) Canada2018

Cybersecurity Awareness Workshop Series (Industry Managers), TD Bank, Toronto, ON (Nov 01-02, 2018) Canada2018

Cybersecurity 101 Workshop Series (Industry Managers), CIC/UNB, Fredericton, NB (Aug 13-16, 2018) Canada2018

Research and Innovation Workshop Series, Bibliography (Postgraduate students), 03/07/2014-03/07/2014 Malaysia2014

Research and Innovation Workshop Series, Research (Postgraduate students), 02/26/2014-02/28/2014 Malaysia2014

Research Methodology, Research and Publication (Lecturers and Researchers), 02/18/2014-02/18/2014 Malaysia2014

ICT Certificates for Industries, (Postgraduate students), 12/14/2012-12/14/2012 Malaysia2012

Curriculum Vitae, (Postgraduate students): 12/13/2012-12/13/2012 Malaysia2012

Research and Innovation Workshop Series, (Postgraduate students) 10/02/2012-11/23/2012 Malaysia2012

Packet Tracer Simulator, (Cisco Based), 08/02/2012-08/23/2012 Malaysia2012

Research and Publication, (Undergraduate students), 07/03/2012-07/24/2012 Malaysia2012

Packet Tracer Simulator, (Cisco Based): 06/05/2012-06/19/2012 Malaysia2012

Research Methodology, (Postgraduate students), 05/19/2012-05/19/2012 Malaysia2012

Conference and Journal Publications, (Postgraduate Students), 03/06/2012-03/20/2012 Malaysia2012

Research Methodology, (Research and Publication), 08/04/2011-08/25/2011 Malaysia2011

Packet Tracer Simulator, (Cisco Based) 06/03/2011-06/24/2011 Malaysia2011

Research Methodology, (Research and Publication), 08/11/2010-08/11/2010 Malaysia2011

Packet Tracer Simulator, (Cisco Based), 08/09/2010-08/10/2010 Malaysia2011