Skip to main content Skip to local navigation
Home » Publications

Publications

To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program, at BCCC we strive to gather, define, and impart fundamental knowledge and understanding to the general public in a manner that is comprehensible, accessible, and inclusive. Our objective is to support the education and training of IT systems and cybersecurity students, academics, researchers, developers, and industry professionals while also disseminating some of the more easily understandable and applicable research findings to the wider community.

Understanding Cybersecurity Series (UCS) knowledge mobilization annual bulletins:

First Bulletin (2024):

Articles


Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis

MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Volume 118, Part B, September 2024, 109436

NLFlowLyzer: Toward Generating an Intrusion Detection Dataset and Intruders Behavior Profiling through Network Layer Traffic Analysis and Pattern Extraction

MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Computer & Security, Computers & Security, 104160, ISSN 0167-4048 (2024)

A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions

Adit Sharma, Arash Habibi Lashkari, Computer Networks, Volume 257, February 2025, 110984


Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning

Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17 (2023)

A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence (2023)

Detection, Characterization and Profiling DOH Malicious Traffic Using Statistical Pattern Recognition

Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma, International Journal of Information Security, Vol. 22, (2023)


IoT malware: An attribute-based taxonomy, detection mechanisms and challenges

Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong & Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol 16, pages1380–1431(2023)

Robust stacking ensemble model for darknet traffic classification under adversarial settings

Hardhik Mohanty, Arousha Haghighian Roudsari and Arash Habibi Lashkari, Computers & Security Journal, Vol 120, 2022

Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset

Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, Vol. 4 (2023)