Skip to main content Skip to local navigation
Home » Cybersecurity Data Analyzers & Datasets » Cybersecurity Data Analyzers (Information Extractors)

Cybersecurity Data Analyzers (Information Extractors)

As part of our Understanding Cybersecurity Series (UCS) knowledge mobilization program, we design, develop, and release cybersecurity data analyzers as open-source packages. Our contribution to open-source projects stems from our belief in the open-source culture, which we consider a driving force for accessible development and a better world. We are convinced that open-source projects promote innovation, collaboration, and healthy competition, making them valuable to the community.

11. Smart Contracts Vulnerability Analyzer (SCsVulLyzer-V2.0)

As part of the Understanding Cybersecurity Series (UCS), SCsVolLyzer is a Python open-source project to extract more than 240 features to profile Smart Contracts (SCs) for vulnerability detection in the Ethereum Blockchain Platform. It is an advanced Python open-source project designed to enhance the profiling of Smart Contracts for improved vulnerabilities detection.
This version stands out by classifying features into compiler-based and non-compiler-based categories, enabling a broader scope of feature extraction compared to SCsVulLyzer V1.0. Compiler-based features, such as the Abstract Syntax Tree (AST) and the Application Binary Interface (ABI), are derived post-compilation, while non-compiler-based features leverage natural language processing techniques tailored to identify critical keywords in the source code. Additionally, the tool introduces three new feature categories—Contract Information, Source Code Information, and Solidity Information—that quantify aspects like function counts, statements, loops, and lines of code. These advancements allow for more granular and in-depth analysis of smart contracts, enhancing the overall utility of SCsVulLyzer V2.0. Another notable enhancement in this version is the introduction of 'bytecode entropy'—a measure of the randomness within the bytecode, which serves as an indicator of unpredictability and complexity. This metric is particularly valuable in fields like cryptography and anomaly detection.

Related published papers:

"Unveiling Smart Contracts Vulnerabilities: Toward Profiling Smart Contracts Vulnerabilities using Enhanced Genetic Algorithm and Generating Benchmark Dataset", Sepideh HajiHosseinKhani, Arash Habibi Lashkari, Ali Mizani Oskui, Blockchain: Research and Applications, December 2024, 100253

More Information & Download Source Code:

10. Application Layer Flow Analyzer (ALFlowLyzer)

ALFlowLyzer generates bidirectional flows from the Application Layer of network traffic, where the first packet determines the forward (source to destination) and backward (destination to source) direction. Hence, the statistical time-related features can be calculated separately in the forward and backward directions. Additional functionalities include selecting features from the list of existing features, adding new features, and controlling the duration of flow timeout.

Related published papers:

Unveiling Malicious DNS Behavior Profiling and Generating Benchmark Dataset through Application Layer Traffic Analysis, MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty, Computers and Electrical Engineering, Volume 118, Part B, September 2024, 109436

More Information & Download Source Code:

9. Network and Transportation Layers Flow Analyzer (NTLFlowLyzer)

The NTLFlowLyzer generates bidirectional flows from the Network and Transportation Layers of network traffic, where the first packet determines the forward (source to destination) and backward (destination to source) directions. Hence, the statistical time-related features can be calculated separately in the forward and backward directions. Additional functionalities include selecting features from the list of existing features, adding new features, and controlling the duration of flow timeout.

Related published papers:

MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, "NLFlowLyzer: Toward generating an intrusion detection dataset and intruders behavior profiling through network layer traffic analysis and pattern extraction", Computers & Security, 2024, 104160, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2024.104160.

More Information & Download Source Code:

8. Benign User Profiler (BUP)

The BUP is responsible for profiling the abstract behavior of human interactions and generating naturalistic, benign background traffic. Profiles can be applied to a diverse range of network protocols with different topologies because they represent the abstract properties of human and attack behavior. Once a benign profile is derived from users, an agent or human operator can generate realistic benign events on the network. Organizations and researchers can use this approach to generate realistic benign data easily; therefore, there is no need to anonymize data sets.

Related published papers:

MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, and Ron Nevo, ”Toward Generating a New Realistic Cloud_based Distributed Denial of Service (DDoS) Dataset and Intrusion Traffic Characterization”, Information, Vol. 15, 2024

More Information & Download Source Code:

7. Smart Contracts Vulnerability Analyzer (SCsVulLyzer-V1.0)

The SCsVulLyzer is a Python-based tool designed to analyze and extract key metrics from Ethereum smart contracts written in Solidity. It employs a suite of functions to dissect the contract's source code, compiling it to obtain its abstract syntax tree (AST), bytecode, and opcodes. The analyzer calculates entropy of the bytecode to assess its randomness and security, determines the frequency of certain opcodes to understand the contract's complexity, and evaluates the usage of key Solidity keywords to gauge coding patterns. This modular and extensible tool provides a comprehensive snapshot of a smart contract's structure and behavior, facilitating developers and auditors in optimizing and securing Ethereum blockchain applications.

Related published papers:

Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani Oskui, “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Blockchain: Research and Applications, Vol. 4, December 2023

More Information & Download Source Code:

6. Authorship Attribution Analyzer (AuthAttLyzer)

The source code of a program often contains some attributes and peculiarities that might can be used to identify the program as they reflect individual coding styles, similar to writer having specific identifiable hand-writings. These stylistic or peculiarities patterns vary from very basic artifacts in the code layout and comments to very fine or subtle habits in control flow of the program or the syntax used. The challenging task of identification of the author of the source code based on these attributes is called as Source Code Authorship Attribution (SCAA). AuthAttLyzer is a source code analyzer that can extract several features including N-rgrams, Word-based embeddings, and Abstract Syntax Tree (AST) features.

Related published papers:

Abhishek Chopra , Nikhill Vombatkere , Arash Habibi Lashkari,”AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework”, The 12th International Conference on Communication and Network Security (ICCNS), China, 2022

More Information & Download Source Code:

5. PDF Malware Analyzer (PDFMalLyzer)

Over the years, PDF has been the most widely used document format due to its portability and reliability. Unfortunately, PDF popularity and its advanced features have allowed attackers to exploit them in numerous ways. There are various critical PDF features that an attacker can misuse to deliver a malicious payload. This program extracts 31 different features from a set of pdf files specified by the user and writes them on a csv file. The resulting csv file can be further studied for variety of purposes, most importantly for detecting malicious pdf files.

Related published papers:

Maryam Issakhani, Princy Victor, Ali Tekeoglu, and Arash Habibi Lashkari1, “PDF Malware Detection Based on Stacking Learning”, The International Conference on Information Systems Security and Privacy, February 2022

More Information & Download Source Code:

4. IMAP Bot AnaLyzer (IMAPBotLyzer)

Credential stuffing is an attack that obtains stolen account credentials, usually sourced from data breaches. It is a technique used to exploit the fact that many people use the same username and password for multiple accounts. Credential stuffing has become a great matter of concern for the Internet Mail Access Protocol (IMAP), a popular method for accessing electronic mail and news messages maintained on a remote server. A significant vulnerability in IMAP and other legacy email protocols is that it cannot support MFA and depends on only a username and password for authentication, leaving it susceptible to credential stuffing. As bots generally carry out credential stuffing attacks, a promising countermeasure is to identify and block them before they can login. Our objective is to use two types of behavioral biometrics - mouse dynamics and keystroke dynamics - for profiling human and bot to distinguish between them. In this project, we introduced a supervised learning bot detection system using mouse and keystroke dynamics and compared the classification of the Random Forest(RF), Decision Tree(DT), Support Vector Machine(SVM), and K-Nearest Neighbors(KNN) machine learning algorithms to identify which model achieves the best overall result.

Related published papers:

“Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics“, Ashley Barkworth, Rehnuma Tabassum and Arash Habibi Lashkari, 12th International Conference on Communication and Network Security (ICCNS2022), China

More Information & Download Source Code:

3. Volatility Memory Analyzer (VolMemLyzer)

Memory forensics is a fundamental step that inspects malicious activities during live malware infection. Memory analysis not only captures malware footprints but also collects several essential features that may be used to extract hidden original code from obfuscated malware. There are significant efforts in analyzing volatile memory using several tools and approaches. These approaches fetch relevant information from the kernel and user space of the operating system to investigate running malware. However, the fetching process will accelerate if the most dominating features required for malware classification are readily available. Volatility Memory Analyzer (VolMemLyzer) is a python code to extract more than 36 features to analyze the malicious activities in a memory snapshot using Volatility tool.

Related published papers:

Arash Habibi Lashkari, Beiqi Li, Tristan Lucas Carrier, Gurdip Kaur, "VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering", Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), IEEE 978-1-7281-6937-8/20, Canada, ON, McMaster University, 2021

More Information & Download Source Code:

2. DNS over HTTPS (DoH) Analyzer (DoHLyzer)

Set of tools to capture HTTPS traffic, extract statistical and time-series features from it, and analyze them with a focus on detecting and characterizing DoH (DNS-over-HTTPS) traffic.

Related published papers:

Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur and Arash Habibi Lashkari, "Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic", The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020

More Information & Download Source Code:

1. Static and Dynamic Android App Analyzer (AndroidApplyzer)

This research focuses on classifying android samples using static and dynamic analysis. The first version of this package covers the data collection and static feature extraction. The second version focuses on developing a classification model using AI for static features. The third version has the dynamic analysis module and related features to improve the classifier.

Related published papers:

Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, Francois Gagnon, and Frédéric Massicotte, "DIDroid: Android Malware Classification and Characterization Using Deep Image Learning", 10th International Conference on Communication and Network Security, Tokyo, Japan, November 2020, https://doi.org/10.1145/3442520.3442521

David Sean Keyes, Beiqi Li, Gurdip Kaur, Arash Habibi Lashkari, Francois Gagnon, Fr´ed´eric Massicotte, "EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics", Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), IEEE 978-1-7281-6937-8/20, Canada, ON, McMaster University, 2021

More Information & Download Source Code:

Who has used our cybersecurity datasets and Analyzers (since September 2023)?

Leaflet © OpenStreetMap contributors

A

  • Aalim Muhammed Salegh College Of Engineering, India
  • Abudhabi University, United Arab Emirates (UAE)
  • Academia de Studii Economice din Bucuresti (ASE), Romania
  • Aditya Institute of Technology and Management (AITAM), India
  • Ain Shams University, Egypt 
  • Air University, Pakistan  
  • Al-Yarmouk, Jordan
  • Al Hussein Technical University, Jordan
  • Ala-Too International University, Kyrgyzstan
  • Aliah University, India 
  • Alibaba, China
  • Algoma Univeristy, Canada
  • Amazon, India  
  • American International University, Bangladesh
  • American University in the Emirates, United Arab Emirates 
  • American University of Sharjah, United Arab Emirates 
  • Amity University Rajasthan, India
  • Amrita Vishwa Vidyapeetham University, India 
  • Antonine University (UA), Lebanon
  • Australian Department of Defence, Australia 

B

  • Babeș-Bolyai University (BBU), Romania
  • Bahrain Polytechnic, Bahrain
  • Banaras Hindu University, India
  • Beijing Information Science & Technology University, China
  • Beijing Jiaotong University, China 
  • Beijing University of Civil Engineering & Architecture (BUCEA), China
  • Beijing University of Posts and Telecommunications, China
  • Bennett University, India
  • Betty Dubois, US
  • Bharatiya Engineering Science and Technology Innovation University, India
  • Birla Institute of Technology And Science - Pilani (BITS), India
  • Bingol University, Turkey
  • Birmingham City University, England  
  • Birkbeck University of London, England
  • BlueLotus, Columbia
  • BlueLotus, Turkey
  • Bml Munjal University, India
  • Bocconi University, Italy
  • Botho University, Botswana
  • Bowie State University, United States of America
  • Bozorgmehr University, Iran 

C

  • Ca' Foscari University of Venice, Italy
  • Caplogy, France
  • Carleton University, Canada
  • Centennial College, Canada
  • Central Queensland University (CQU), Australia
  • ChangChun University, China
  • Christ Academy Institute for Advanced Studies (CAIAS), India 
  • Catholic University of the Sacred Heart, Italy 
  • Central South University, China 
  • Charles Sturt University, Australia
  • China Telecom, China
  • Christ Academy College for Advanced Studies, India 
  • Chung-Ang University, Korea
  • CINEC, Sri Lanka
  • Cisco Systems Inc, United States of America
  • Clark University, United States of America
  • Cochin University of Science and Technology, India  
  • CodePath, United States of America
  • COEP Technological University, India  
  • Complex Systems Research Lab, Pakistan
  • Conestoga College, Canada
  • Consultant, UK 
  • Cooperative University of Kenya
  • cPacket, United States of America
  • CQVista Inc., South Korea 
  • CUAB, Nigeria 
  • Cyber, Belgium 
  • Cyber Fix Ltd, Pakistan
  • Cyber Fort, Nigeria
  • Cyber Silo Inc., United States of America

D

  • Dalhousie University, Canada  
  • Dalian Jiaotong University, China 
  • Deakin University, Australia 
  • Delhi Technological University, India 
  • Deloitte, Japan
  • Deputy Social Media Secretary, Pakistan
  • Dr. Shariati Technical and Vocational College, Iran 
  • Durham College, Canada
  • Duy Tan University, Vietnam
  • DXC Technology, Italia

E

  • Early Code Training Institute, Nigeria
  • East China Normal University, China  
  • Eastern Institute of Technology, New Zealand 
  • Edectus.com
  • Edinburgh Napier University, UK
  • Egypt-Japan University of Science and Technology (E-JUST), Egypt
  • Emory University, United States of America
  • Enugu State University of Science and Technology, Nigeria
  • Equinix, United States of America
  • Erlangen University, Germany 
  • Eskisehir Osmangazi University, Turkey
  • EXATEL, Poland
  • Ezam Co., Iran

F

  • Fachhochschule der Wirtschaft, Germany 
  • Faculdade de Ciências da Universidade do Porto, Portugal
  • Federal University of Vicosa (UFV), Brazil
  • Feng Chia University, Taiwan 
  • EFREI PARIS, France
  • FHDW Paderborn, Germany 
  • Fitchburg State University, United States of America
  • Fluminense Federal University, Brasil
  • French National Institute for Research in Digital Science and Technology, France
  • Fudan University, China
  • Fundação Getulio Vargas (FGV), Brazil
  • Fuzhou University, China  

G

  • Gandhi Institute of Technology and Management, India
  • General Assembly, Bahrain 
  • George Mason University, United States of America
  • George Washington University, United States of America
  • German University In Cairo, Egypt
  • Ghent University, IDLab-Imec, Belgium 
  • Google, United States of America
  • Graphic Deemed University, India 
  • Green University of Bangladesh, Bangladesh
  • Guru Govind Singh University, India 

H

  • Hadhramout University, Yemen
  • Hangzhou Dianzi University, China
  • Harbin Institute of Technology, China
  • Harward university, United Stated of America
  • Heilongjiang University, China
  • Higher Technology Institute, Egypt
  • HIRU TV, Sri Lanka
  • Ho Chi Minh City University of Technology (HCMUT), Vietnam
  • Hogeschool van Amsterdam, Netherlands
  • Hohai University, China  
  • Holy Angel University, Philippines 
  • HTI, Egypt
  • HVA International, Netherlands
  • HUST, Vietnam 

I

  • i4 Ops, United States of America
  • IIIT Surat, India
  • Institute for Advanced Study (IAS), United States of America
  • Institute of Technology (IUT) of Béziers, University of Montpellier, France
  • Institut Superieur d'Informatique de Mahdia, Tunisia
  • Institut Teknologi Bandung, Indonesia
  • Instituto Superior de Ciências de Educação da Huíla (ISCED-Huíla), Angola
  • Iqra University - Islamabad Campus (IUIC), Pakistan
  • IILM Univeristy, India
  • IIT BHU, India
  • Illinois Institute of Technology, United States of America
  • Indian Institute of Technology (BHU) Varanasi, India 
  • IMP Group International, Canada
  • Informatics Institute of Technology, Sri Lanka
  • Institute of Technology of Cambodia, Cambodia  
  • Instituto Militar de Engenharia (IME), Brazil
  • IPN, Mexico
  • Islamic Azad University, Iran 
  • Istanbul Commerce University (İstanbul Ticaret Üniversitesi), Turkey
  • Istanbul Technical University, Turkey
  • Ivan Franko National University of Lviv, Ukraine

J

  • Jain University, India
  • Jiangsu University, China 
  • Jinan University, China
  • Johns Hopkins University, United States of America
  • John Jay College of Criminal Justice, United States of America
  • Jordan University of Science & Technology (JUST), Jordan
  • JNU, China 

K

  • Kadir Has University, Türkiye
  • Kansas State University (KSU), United Stated of America
  • Kaplan Business School, Australia
  • Karachi Institute of Economics and Technology (KIET), India
  • Karnatak Lingayat Education Technological University, India
  • Keele University, UK
  • Kennesaw State University, United States of America
  • Kent State University, United States of America
  • Khwaja Fareed University of Engineering & Information Technology (KFUEIT), Pakistan
  • King Monkut Institute of Technology Ladkrabang, Thailand
  • KMUTNB, Thailand 
  • KNUST, Ghana
  • Kookmin University, South Korea
  • Kumoh National insitittute of Technology, South Korea
  • Kütahya Dumlupınar üniversitesi, Turkey 

L

  • Laboratoire Informatique, Image et Interaction (L3i), France
  • Langara College, Canada
  • La Salle University - Ramon Llull, Spain 
  • Lahore Leads University (LLU), Pakistan
  • Lebanese American University (LAU), Lebanon
  • Libtan Acadmy, Libya
  • Load Go Transport Inc., Canada 
  • Ludwig-Maximilians-University, Germany

M

  • M.Kumarasamy College of Engineering (MKCE), India
  • Macau Polytechnic University, China
  • Madurai Kamaraj University, India 
  • Mahidol University, Thailand
  • Malaviya National Institute of Technology Jaipur (MNIT), India 
  • Malaya University, Malaysia
  • Malmö University, Sweden
  • Makerere University, Uganda
  • Maven Technical, Nigeria
  • Medcare MSO, Pakistan
  • McGill University, Canada
  • Michigan Technological University, United States of America
  • Middle Tennessee State University, United States of America
  • Misr International University, Egypt
  • MITRE.org, United States of America
  • Mojass Sdn. Bhd., Malaysia
  • Montclair State University, United States of America
  • Moscow State University of Technology (Stankin), Russia
  • Motilal Nehru National Institute of Technology, India
  • Mumbai University, India  
  • Murdoch University, Australia

N

  • Namal University Mianwali, Pakistan  
  • Najaf Abad University, Iran
  • Nanjing Tech, China  
  • Nanjing University of Science and Technology (NJUST), China  
  • Nanjing University, China  
  • Nara Institute of Science and Technology (NARA), Japan
  • National Centre For Cyber Security - UET Peshawar (NCCS-UETP), Pakistan
  • National College of Ireland, Ireland
  • National Forensic Sciences University (NFSU), India  
  • National Forensic Sciences University, India  
  • National Institute of Technology Karnataka (NITK), India  
  • National Institute of Technology(NIT), India  
  • National Intelligence and Research University College, Kenya
  • National Sun Yat-sen University, Taiwan  
  • National Taiwan University of Science and Technology, Taiwan  
  • National Taiwan University, Taiwan
  • National Technical University of Athens (NTUA(, Greece
  • National Technological University of South Lima, Peru
  • National University of Defense Technology, China 
  • National University of Technology (NUTECH), Pakistan  
  • National University of Singapore (NUS), Singapore
  • New Mansoura University, Egypt  
  • New Mexico State University, United States of America
  • New York University Tandon, United States of America
  • Ngee Ann Polytechnic, Singapore
  • NIELIT Calicut, India  
  • NIIT University, India
  • Nile University, Egypt 
  • Nirma University, India 
  • North Carolina State University, United States of America
  • North China Electric Power University, China
  • Northeastern University (University in Shenyang), China
  • Northeastern University, United States of America
  • National University of Sciences & Technology (NUST), Pakistan  

O

  • Oita University, Japan
  • Oriental University, India

P

  • Pabna University of Science and Technology, Bangladesh  
  • Panimalar, India
  • Parahyangan catholic university, Indonesia  
  • Pentangularit, Bangladesh
  • Polytechnic Institute of Leiria (IPLeiria), Portugal 
  • Politeknik Negeri Cilacap, Indonesia
  • PolyU, Poland
  • Posts and Telecommunications Institute of Technology (PTIT), Vietnam
  • Premier University, Bangladesh  
  • Prime University, Bangladesh
  • Prince Sattam bin Abdulaziz University, Saudi Arabia
  • Princess Nourah Bint Abdul Rahman University, Saudi Arabia  
  • Princess Sumaya University for Technology (PSUT), Jordan
  • Prince Sattam Bin Abdulaziz University, Saudi Arabia 
  • PSG College of Technology, India 
  • PSL Research University, France  
  • PUC Minas, Brazil
  • Pusan National University (PNU), South Korea 

Q

  • Quaid-e-Azam University, Pakistan
  • Quantea.com, United States of America
  • Queen's University, Canada
  • Queen Mary University of London, UK 

R

  • rAIxon, UK
  • Red Moon, United States of America
  • Rentile, Czech
  • Reva University, India    
  • Rey Juan Carlos University, Spain
  • Rice University, United States of America
  • Rochester Institute of Technology, United States of America
  • Royal Military College of Canada,
  • RUDRA Cybersecurity, India 

S

  • S.E.A Protection Services, Canada  
  • Sacred Heart University (SHU), United States of America
  • Samsun University, Turkey
  • Sardar Patel Institute of Technology, India  
  • São Paulo State University, Brazil 
  • Saveetha Engineering College, India
  • secunet Security Networks AG, Germany
  • SecureITlab, Bahrain  
  • Selçuk Üniversitesi, Turkey  
  • Seneca College, Canada  
  • Shahid Beheshti University, Iran 
  • Shahid Rajaee University, Iran
  • Sharda University, India
  • Shandong University, China  
  • Shaqra University, Saudi Arabia
  • Shenzhen University, Yaman
  • Siberian Federal University, Siberia  
  • Siddaganga Institute of Technology (SIT), India
  • Singapore Institute of Directors (SID), Singapore
  • Singapore Management University (SMU), Singapore   
  • SoftCrafted.com
  • Sol Plaatje University, South Africa
  • South China University of Technology, China 
  • Southeast University, China 
  • Sri Krishna Arts and Science College, India  
  • Sri Ramaswamy Memorial Institute of Science and Technology (SRM), India
  • Sri Sivasubramaniya Nadar College of Engineering, India  
  • Srinivas University, India  
  • SRM Institute of Science and Technology, India  
  • Ss. Cyril and Methodius University in Skopje (UKIM), North Macedonia
  • St. Petersburg State University, Russia
  • Staffordshire University, UK
  • Stanford University, United States of America
  • State Polytechnic of Ujung Pandang, Indonesia  
  • Sulaimani Polytechnic University, Iraq
  • Swe, England  
  • Symbiosis Centre for Information Technology, India
  • Szkoła Główna Gospodarstwa Wiejskiego w Warszawie, Poland 

T

  • Taibah University, Saudi Arabia  
  • Technical and Vocational University. Shariaty Technical College, Iran  
  • Technical University of Cluj-Napoca, Romania
  • Technical University of Kosice (TUKE), Slovakia
  • Technological University of Panama, Panama  
  • Telkom University, Indonesia  
  • Texas A&M University, United States of America
  • Thamar University, Yemen
  • Third Sarl., Cameroon  
  • The Alan Turing Institute, UK
  • Tianjin University of Technology, China  
  • Tishreen University, Syria 
  • TNT Prowash and Preservation, Scotland
  • Todyl Inc, United States of America
  • Tokyo City University (TCU), Japan
  • Tokyo Metropolitan University, Japan
  • Tongji University, China   
  • Trideum Corporation, United States of America
  • Tshimologong Precinct, Technology Park in South Africa  
  • Tsinghua University, China  
  • TU Wien, Austria 

U

  • UAF sub campus burewala, Pakistan
  • UCAS, Bangladesh
  • UCL, United States of America
  • UCSD, United States of America
  • Ulster University, United Kingdom
  • Ultra-Intelligent Computing/Communications Lab, Chung-Ang University, South Korea
  • UNB (Canadian Institute For Cybersecurity), Canada  
  • UiTM, Malaysia
  • UNED, Spain
  • Unesp - São Paulo State University, Brazil
  • Unisinos, Brazil
  • United Commercial Bank PLC, Bangladesh 
  • Universidad Carlos III de Madrid, Spain
  • Universidad Federal de Río Grande del Sur (UFRGS), Brazil
  • Universidade federal De lavras, Brazil
  • Universidad Politécnica Salesiana (UPS), Ecuador
  • Universidade Federal de Santa Catarina (UFSC), Brazil
  • Universidad Popular Autónoma del Estado de Puebla (UPAEP), Mexico 
  • Universidad Nacional de Educación a Distancia (UNED), Spain
  • Universidade Federal Fluminense (UFF), Brazil
  • Università di Palermo, Italy
  • Universitas Ciputra Surabaya, Indonesia
  • Universitas Royal, Indonesia
  • Universitas Pamulang, Indonesia
  • Universitas Pelita Harapan, Indonesia
  • Universitas Siliwangi, Indonecia
  • Université de Sherbrooke, Canada 
  • Université du Quebec en Outaouais (UQO), Canada
  • Université Internationale des Technologies de l'Information, Kazakhstan
  • Université Mohammed Premier (UMP), Morocco
  • Universiti Malaysia Pahang Al-Sultan Abdullah (UMPASA), Malaysia
  • Universiti Tenaga Nasional Malaysia, Malaysia  
  • Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia 
  • University Catholic of Maule, Chile
  • University College Dublin, Ireland  
  • University Mohammed 5 Rabat, Morocco  
  • University of Applied Sciences Munich (UDBW), Germany
  • University of Bristol, UK
  • University of Calgary, Canada
  • University of Cádiz, Spain
  • University of Mostar, Bosnia and Herzegovina
  • University College London
  • University of Auckland, New Zealand
  • University of Calgary, Canada  
  • University of California San Diego, United States of America
  • University of Calabria, Italy 
  • University of Campania, Italy  
  • University Charles III, Spain
  • University of Carthage, Tunesia
  • University of Caxias do Sul, Brazil  
  • University of Chicago, United States of America
  • University of Chinese Academy of Sciences, China 
  • University of Chinese Academy of Sciences (UCAS), China  
  • University of Colombo, Colombia
  • University of Delhi, India  
  • University of Dodoma, Tanzania
  • University of Doha for Science an Technology, Qatar
  • University of East London, UK 
  • University of Economics and Innovation in Lublin, Poland
  • University of Electronic Science and Technology of China, China 
  • University of Engineering & Applied Sciences (Swat), Pakistan 
  • University of Engineering and Technology (UET), Taxila, Pakistan 
  • University of Exeter, United Kingdom
  • University of Ferrara, Italia
  • University of Guelph, Canada 
  • University of Houston, United States of America
  • University of Indonesia, Indonesia
  • University of Jaén, Spain
  • University of Johannesburg, South Africa
  • University of Kashmir, Iraq
  • University of Kashmir, Pakistan
  • University of Kelaniya, Sri Lanka
  • University of Kufa, Iraq
  • university of London, UK
  • University of Malta, Malta
  • University of Muhammadiyah Malang, Indonesia
  • University of Nagasaki, Japan
  • University of New Mexico (UNM), Mexico
  • University of New Mexico, United States of America
  • University of Niagara Falls, Canada
  • University of Oulu, Finland
  • University of Oregon, United States of America
  • University of Padua, Italy
  • University of Quebec, Canada
  • University of Reading, England  
  • University of Riau, Indonesia 
  • University of São Paulo, Brazil
  • University of Science and Technology Chittagong, Bangladesh 
  • University of Salerno (UNISA), Italy
  • University of Sharjah, UAE
  • University of South Carolina, United States of America
  • University of Staffordshire, UK
  • University of Toronto (UofT), Canada
  • University of Victoria (UVIC), Canada
  • University of Texas, United States of America
  • University of the Chinese Academy of Sciences, China
  • University of Toronto, Canada
  • University of Vale do Rio dos Sinos Campus São Leopoldo (Unisions), Brazil
  • University of Waikato, New Zealand
  • University of Waterloo, Canada
  • University of Zürich, Switzerland
  • Universitas Pamulang, Indonesia
  • Universiti Sains Malaysia,
  • United International University (UIU), Bangladesh
  • United States Military Academy,
  • UNOB, Slovakia 
  • UNOC, Czech Republic 
  • UNSW Sydney, Australia
  • UPAEP, Mexico
  • USP, Brazil
  • USM, Malaysia 

V

  • Vellore Institute of Technology (VIT), India
  • Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India
  • Viavi Solutions, United States of America
  • Vietnamese-German University, Vietnam
  • Vishwakarma University, India 

W

  • Warsaw University of Technology, Poland
  • Wayne State University, United States of America
  • Westpac, Australia 
  • Wolkite University, Ethiopia
  • Wrocław University of Science and Technology, Poland
  • Wuhan university, China  

X

  • Xi'an University of Technology, China  

Y

  • YAYAFOOD, Nigeria 
  • York University, Canada 

Z

  • Zhejiang University, China