Skip to main content Skip to local navigation
Home » Posts tagged 'Public' (Page 3)

Public

New Analyzer Alert! (SCsVulLyzer-V1.0)

The Smart Contracts Vulnerability Analyzer (SCsVulLyzer) is a Python-based tool designed to analyze and extract key metrics from Ethereum smart contracts written in Solidity. It employs a suite of functions to dissect the contract's source code, compiling it to obtain its abstract syntax tree (AST), bytecode, and opcodes. The analyzer calculates entropy of the bytecode […]

New Dataset Alert! (BCCC-VulSCs-2023)

BCCC-VulSCs-2023 We released the 'BCCC-VulSCs-2023' dataset to analyze the secure and vulnerable Smart Contracts. The BCCC-VulSCs-2023 dataset is a substantial collection for Solidity Smart Contracts (SCs) analysis, comprising 36,670 samples, each enriched with 70 feature columns.  Dataset: BCCC-VulSCs-2023

New Article Alert!

Research Article Unveiling vulnerable smart contracts: Toward profiling vulnerable smart contracts using genetic algorithm and generating benchmark dataset

Workshops/Talks

Recent Event Elevating Cybersecurity Vigilance: Cybersecurity, Social Engineering, and AI Threats in K-12 Education OSBIE, Cambridge, ON, Canada Nov 21, 2024 Past Events Elevating Cybersecurity Vigilance: Cybersecurity, Social Engineering, and AI Threats in K-12 Education, OSBIE, Cambridge, ON, Canada (Nov 21) Canada 2024 The Future of Cybersecurity: Leveraging Cybersecurity Open-Source Tools and Datasets for Enhanced […]

Elevating Cybersecurity Vigilance: Understanding Cybersecurity Series (UCS)

MacEwan University, Edmunton, Alberta, Canada (Feb 2024) Cybersecurity for All: Raising Awareness Across the Digital Landscape Elevate your cybersecurity awareness with our Understanding Cybersecurity (UCS) seminar series. Designed for students, researchers, and Developers, UCS provides essential knowledge and skills to tackle cyber threats effectively. Join us and boost your cybersecurity vigilance! Delivering another seminar from […]

New Dataset Alert! (BCCC-CIRA-CIC-DoHBrw-2020)

BCCC-CIRA-CIC-DoHBrw-2020 We released the 'BCCC-CIRA-CIC-DoHBrw-2020' dataset to address the imbalance in the 'CIRA-CIC-DoBre-2020' dataset. Unlike the 'CIRA-CIC-DoHBrw-2020' dataset, which is skewed with about 90% malicious and only 10% benign Domain over HTTPS (DoH) network traffic, the 'BCCC-CIRA-CIC-DoHBrw-2020' dataset offers a more balanced composition including 249,836 instances in each category. Dataset: BCCC-CIRA-CIC-DoHBrw-2020

Navigating Cybersecurity: Empowering Public Safety and Awareness through the Understanding Cybersecurity Series (UCS) Research Program

Cybersecurity Month, October 2023 Cybersecurity for All: Raising Awareness Across the Digital Landscape In recognition of Cybersecurity Month, we proudly present our research center's (BCCC) commitment to enhancing public safety and awareness through the innovative Understanding Cybersecurity Series (UCS) Research Program at the York Circle annual event. Join us on a journey of navigating the […]

Collaborative Cybersecurity Workshop with BCCC and NICT: Bridging Research and Practice

Cybersecurity Workshop The Understanding Cybersecurity Series (UCS) is a comprehensive knowledge mobilization program aimed at addressing the critical issue of cybersecurity resiliency on a broader scale founded by Professor Arash Habibi Lashkari at the School of Information Technology in York. It operates under the premise that tackling cybersecurity challenges effectively requires creating efficient and relevant […]

New Dataset Alert! (BCCC-SFU-SQLInj-2023)

BCCC-SFU-SQLInj-2023 We released our SQL Injection Attack dataste namely BCCC-SFU-SQLInj-2023, and published related paper entitled "An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation". Dataset: BCCC-SFU-SQLInj-2023

Projects

In recent years, the rise of Industry 4.0 has accelerated the digitalization of the industry, blurring the boundaries between information technologies (IT) and operational technologies (OT). This convergence has brought about new challenges in cybersecurity, including emerging attack vectors, threats, and security vulnerabilities. To protect industrial infrastructure from these risks, monitoring and detection systems have […]