Skip to main content Skip to local navigation
Home » Posts tagged 'Behaviour-Centric Cybersecurity Center (BCCC)' (Page 3)

Behaviour-Centric Cybersecurity Center (BCCC)

New Analyzer Alert! (AuthAttLyzer)

New Analyzer Alert! (AuthAttLyzer)

AuthAttLyzer We released the first version of Authorship Attribution Analyzer (AuthAttLyzer), dataset (YU-SCAA-2022) and published related paper entitled "AuthAttLyzer - A Robust defensive distillation-based Authorship Attribution framework"

UCS Book Published: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective

UCS Book Published: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective

Book Our third UCS book has been published: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective ISBN: 978-3-030-88703-2 Canada 2022

Data Analyzers & Datasets

Data Analyzers & Datasets

Cybersecurity Data Analyzers As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we design, develop, and release cybersecurity data analyzers as open-source packages to help you to collect, process and analyze vast amounts of data from various sources. Learn More Cybersecurity Datasets As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we create […]

Publications

Publications

To tackle the challenge of enhancing cybersecurity resiliency on a broader scale, it is essential to collaborate with the industry and employ innovative research methods to develop efficient and relevant tools while promoting public education and awareness. As part of the Understanding Cybersecurity Series (UCS) program, at BCCC we strive to gather, define, and impart […]

Cybersecurity Datasets

Cybersecurity Datasets

As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we generate and release cybersecurity datasets to support students, researchers and developers to analyze, test and evaluate their cybersecurity models, solutions and tools. 6. Malicious DNS and Attacks (BCCC-CIC-Bell-DNS-2024) Using ALFlowLyzer, we successfully generated an augmented dataset, "BCCC-CIC-Bell-DNS-2024," from two existing datasets: "CIC-Bell-DNS-2021" and "CIC-Bell-DNS-EXF-2021." […]

Cybersecurity Data Analyzers

Cybersecurity Data Analyzers

As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we design, develop, and release cybersecurity data analyzers as open-source packages. Our contribution to open-source projects stems from our belief in the open-source culture, which we consider a driving force for accessible development and a better world. We are convinced that open-source projects promote […]

Team

Team

Founder and Director Arash Habibi Lashkari Canada Research Chair (CRC-TII) Associate Professor, School of Information Technology Graduate Faculty at Electrical Engineering and Computer Science (EECS) Current Graduate Students Amirhossein Ahmadneghad Master Student (MCS), 2024 Jason Matth Green PhD Student (NC A&T), 2023 Reza Abbaszadeh Master Student (MCS), 2024 John Bedeabasi PhD Student (NC A&T), 2024 […]

Online Blogs

Online Blogs

In addition to academic materials such as articles, book chapters, and books, as part of the Understanding Cybersecurity Series (UCS) program, at BCCC, we plan to create non-technical materials that cater to a broad audience, including youth, seniors, laypeople, and the general public. We will disseminate relevant findings to the public through digital social communication […]

Contact

Contact

Research Office DB 2004, Victor Phillip Dahdaleh Building (formerly TEL), 4700 Keele Street, Toronto, ON M3J 1P3 416-736-2100 ext. 66624 ahabibil@yorku.ca

Welcome to BCCC

Welcome to BCCC

Malicious attacks display discernible behavior patterns that diverge from regular activity within a system or network, making them distinguishable. While companies can typically detect harmful behavior through signatures closely linked to specific types of well-known attacks, attackers continuously develop new techniques, methods, and procedures that enable them to penetrate vulnerable environments and move laterally without […]