default search action
Arash Habibi Lashkari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j26]MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction. Comput. Secur. 148: 104160 (2025) - 2024
- [j25]MohammadMoein Shafi, Arash Habibi Lashkari, Hardhik Mohanty:
Unveiling malicious DNS behavior profiling and generating benchmark dataset through application layer traffic analysis. Comput. Electr. Eng. 118: 109436 (2024) - [j24]Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
A survey on run-time packers and mitigation techniques. Int. J. Inf. Sec. 23(2): 887-913 (2024) - [j23]Sepideh Niktabe, Arash Habibi Lashkari, Dilli Prasad Sharma:
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition. Int. J. Inf. Sec. 23(2): 1293-1316 (2024) - [j22]Ehab Alkhateeb, Ali A. Ghorbani, Arash Habibi Lashkari:
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis. Inf. 15(2): 102 (2024) - [j21]Xie He, Arash Habibi Lashkari, Nikhill Vombatkere, Dilli Prasad Sharma:
Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey. Inf. 15(3): 131 (2024) - [j20]MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez, Ron Nevo:
Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization. Inf. 15(4): 195 (2024) - [j19]Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning. Peer Peer Netw. Appl. 17(1): 507-531 (2024) - 2023
- [j18]Madumitha Venkatasubramanian, Arash Habibi Lashkari, Saqib Hakak:
IoT Malware Analysis Using Federated Learning: A Comprehensive Survey. IEEE Access 11: 5004-5018 (2023) - [j17]Hesamodin Mohammadian, Ali A. Ghorbani, Arash Habibi Lashkari:
A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems. Appl. Soft Comput. 137: 110173 (2023) - [j16]Nasrin Badie, Ab Razak Che Hussin, Elaheh Yadegaridehkordi, Dalbir Singh, Arash Habibi Lashkari:
A SEM-STELLA approach for predicting decision-makers' adoption of cloud computing data center. Educ. Inf. Technol. 28(7): 8219-8271 (2023) - [j15]Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. Peer Peer Netw. Appl. 16(3): 1380-1431 (2023) - [c40]Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari:
An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation. ISI 2023: 1-6 - [c39]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach. PST 2023: 1-12 - [c38]Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Label Flipping Attack in Deep Learning-Based NIDS. SECRYPT 2023: 597-603 - 2022
- [j14]Mohammed Aldarwbi, Ali A. Ghorbani, Arash Habibi Lashkari:
QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution. IEEE Access 10: 107685-107702 (2022) - [j13]Mohammed Aldarwbi, Arash Habibi Lashkari, Ali A. Ghorbani:
The sound of intrusion: A novel network intrusion detection system. Comput. Electr. Eng. 104(Part): 108455 (2022) - [j12]Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari:
Robust stacking ensemble model for darknet traffic classification under adversarial settings. Comput. Secur. 120: 102830 (2022) - [j11]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
A Trust-Influenced Smart Grid: A Survey and a Proposal. J. Sens. Actuator Networks 11(3): 34 (2022) - [c37]Ashley Barkworth, Rehnuma Tabassum, Arash Habibi Lashkari:
Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics. ICCNS 2022: 7-15 - [c36]Abhishek Chopra, Nikhill Vombatkere, Arash Habibi Lashkari:
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework. ICCNS 2022: 43-50 - [c35]Madumitha Venkatasubramanian, Arash Habibi Lashkari, Saqib Hakak:
Federated Learning Assisted IoT Malware Detection Using Static Analysis. ICCNS 2022: 191-198 - [c34]Tristan Carrier, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari:
Detecting Obfuscated Malware using Memory Feature Engineering. ICISSP 2022: 177-188 - [c33]Hesamodin Mohammadian, Arash Habibi Lashkari, Ali A. Ghorbani:
Evaluating Deep Learning-based NIDS in Adversarial Settings. ICISSP 2022: 435-444 - [c32]Maryam Issakhani, Princy Victor, Ali Tekeoglu, Arash Habibi Lashkari:
PDF Malware Detection based on Stacking Learning. ICISSP 2022: 562-570 - 2021
- [j10]Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani:
Classifying and clustering malicious advertisement uniform resource locators using deep learning. Comput. Intell. 37(1): 511-537 (2021) - [j9]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A memory-based game-theoretic defensive approach for digital forensic investigators. Digit. Investig. 38: 301214 (2021) - [j8]Mohammed Aldarwbi, Ali A. Ghorbani, Arash Habibi Lashkari:
KeyShield: A Scalable and Quantum-Safe Key Management Scheme. IEEE Open J. Commun. Soc. 2: 87-101 (2021) - [c31]Samaneh Mahdavifar, Nasim Maleki, Arash Habibi Lashkari, Matt Broda, Amir H. Razavi:
Classifying Malicious Domains using DNS Traffic Analysis. DASC/PiCom/CBDCom/CyberSciTech 2021: 60-67 - [c30]Miraqa Safi, Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Arash Habibi Lashkari, Heather Molyneaux, Ali A. Ghorbani:
Behavioural Monitoring and Security Profiling in the Internet of Things (IoT). HPCC/DSS/SmartCity/DependSys 2021: 1203-1210 - [c29]Samaneh Mahdavifar, Amgad Hanafy Salem, Princy Victor, Amir H. Razavi, Miguel Garzón, Natasha Hellberg, Arash Habibi Lashkari:
Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning. ICCNS 2021: 80-86 - [c28]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
RiskISM: A Risk Assessment Tool for Substations. iSCI 2021: 23-30 - [c27]Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari:
A Novel Trust Model In Detecting Final-Phase Attacks in Substations. PST 2021: 1-11 - [c26]Farzaneh Shoeleh, Masoud Erfani, Saeed Shafiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani:
User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security. PST 2021: 1-10 - [c25]Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani:
Towards Query-efficient Black-box Adversarial Attack on Text Classification Models. PST 2021: 1-7 - 2020
- [j7]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A game-theoretic defensive approach for forensic investigators against rootkits. Digit. Investig. 33: 200909 (2020) - [j6]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour. Digit. Investig. 35: 301024 (2020) - [c24]Gurdip Kaur, Arash Habibi Lashkari, Abir Rahali:
Intrusion Traffic Detection and Characterization using Deep Image Learning. DASC/PiCom/CBDCom/CyberSciTech 2020: 55-62 - [c23]Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur, Arash Habibi Lashkari:
Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic. DASC/PiCom/CBDCom/CyberSciTech 2020: 63-70 - [c22]Arash Habibi Lashkari, Gurdip Kaur, Abir Rahali:
DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning. ICCNS 2020: 1-13 - [c21]Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, François Gagnon, Frédéric Massicotte:
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning. ICCNS 2020: 70-82
2010 – 2019
- 2019
- [j5]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
An evaluation framework for network security visualizations. Comput. Secur. 84: 70-92 (2019) - [j4]Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani:
A Survey on User Profiling Model forAnomaly Detection in Cyberspace. J. Cyber Secur. Mobil. 8(1): 75-112 (2019) - [c20]Kwasi Boakye-Boateng, Arash Habibi Lashkari:
Securing GOOSE: The Return of One-Time Pads. ICCST 2019: 1-8 - [c19]Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani:
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. ICCST 2019: 1-8 - [c18]Laya Taheri, Andi Fitriah Abdul Kadir, Arash Habibi Lashkari:
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. ICCST 2019: 1-8 - 2018
- [c17]Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals. ICCST 2018: 1-6 - [c16]Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Laya Taheri, Ali A. Ghorbani:
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. ICCST 2018: 1-7 - [c15]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. ICISSP 2018: 108-116 - [c14]Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
A Detailed Analysis of the CICIDS2017 Data Set. ICISSP (Revised Selected Papers) 2018: 172-188 - 2017
- [j3]Rongxing Lu, Kevin Heung, Arash Habibi Lashkari, Ali A. Ghorbani:
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT. IEEE Access 5: 3302-3312 (2017) - [c13]Arash Habibi Lashkari, Gerard Draper-Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani:
A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection. ICCNS 2017: 59-66 - [c12]Arash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, Ali A. Ghorbani:
CIC-AB: Online ad blocker for browsers. ICCST 2017: 1-7 - [c11]Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani:
BotViz: A memory forensic-based botnet detection and visualization approach. ICCST 2017: 1-8 - [c10]Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Tor Traffic using Time based Features. ICISSP 2017: 253-262 - [c9]Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani:
Towards a Network-Based Framework for Android Malware Detection and Characterization. PST 2017: 233-234 - [c8]Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani:
A Lightweight Online Advertising Classification System using Lexical-based Features. SECRYPT 2017: 486-494 - 2016
- [j2]Mazdak Zamani, Isao Echizen, Arash Habibi Lashkari:
Innovations in Communications Security. J. Electr. Comput. Eng. 2016: 4743084:1 (2016) - [c7]Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani:
Characterization of Encrypted and VPN Traffic using Time-related Features. ICISSP 2016: 407-414 - [c6]Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani:
Detecting Malicious URLs Using Lexical Analysis. NSS 2016: 467-482 - 2015
- [j1]Nasrin Badie, Ab Razak Che Hussin, Arash Habibi Lashkari:
Cloud Computing Data Center Adoption Factors Validity By Fuzzy AHP. Int. J. Comput. Intell. Syst. 8(5): 854-873 (2015) - 2012
- [c5]Behrang Parhizkar, Waqas Khalid Obeidy, Shahan Ahmad Chowdhury, Zahra Mohana Gebril, Mike Ng Ah Ngan, Arash Habibi Lashkari:
Android mobile augmented reality application based on different learning theories for primary school children. ICMCS 2012: 404-408 - 2011
- [c4]Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom:
A Secure Recognition Based Graphical Password by Watermarking. CIT 2011: 164-170 - [c3]Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud:
Security Evaluation for Graphical Password. DICTAP (1) 2011: 431-444 - [c2]Arash Habibi Lashkari, Seyedeh Ghazal Ghalebandi, Mohammad Reza Moradhaseli:
A Wide Survey on Botnet. DICTAP (1) 2011: 445-454 - [c1]Ahmed A. Sabeeh, Arash Habibi Lashkari:
Users' perceptions on mobile devices security awareness in Malaysia. ICITST 2011: 428-435 - [i3]Behrang Parhizkar, Ashraf Abbas M. Al-Modwahi, Arash Habibi Lashkari, Mohammad Mehdi Bartaripou, Hossein Reza Babae:
A Survey on Web-based AR Applications. CoRR abs/1111.2993 (2011) - 2010
- [i2]Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria:
A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns. CoRR abs/1001.1962 (2010)
2000 – 2009
- 2009
- [i1]Arash Habibi Lashkari, Samaneh Farmand, Omar Bin Zakaria, Rosli Saleh:
Shoulder Surfing attack in graphical password authentication. CoRR abs/0912.0951 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint