Follow
Arash Habibi Lashkari
Arash Habibi Lashkari
Canada Research Chair and Associate Professor in Cybersecurity @ York University
Verified email at yorku.ca - Homepage
Title
Cited by
Cited by
Year
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
The International Conference on Information Systems Security and Privacy …, 2018
35292018
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 international carnahan conference on security technology (ICCST), 1-8, 2019
8572019
Characterization of Tor Traffic using Time based Features
AH Lashkari, GD Gil, MSIMAA Ghorbani
The 3rd International Conference on Information Systems Security and Privacy …, 2017
7842017
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
The 2nd international conference on information systems security and privacy …, 2016
7562016
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
5082017
Toward developing a systematic approach to generate benchmark android malware datasets and classification
AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani
2018 International Carnahan conference on security technology (ICCST), 1-7, 2018
3092018
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2018 (1), 177-200, 2018
3082018
An evaluation framework for intrusion detection dataset
A Gharib, I Sharafaldin, AH Lashkari, AA Ghorbani
The IEEE International Conference on Information Science and Security (ICISS …, 2016
2802016
A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i)
AH Lashkari, MMS Danesh, B Samadi
The 2nd IEEE International Conference on Computer Science and Information …, 2009
2782009
Characterization of encrypted and VPN traffic using time-related features
GD Gil, AH Lashkari, M Mamun, AA Ghorbani
Proceedings of the 2nd international conference on information systems …, 2016
2092016
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
The International Conference on Network and System Security, 467-482, 2016
2012016
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls
L Taheri, AFA Kadir, AH Lashkari
The International Carnahan Conference on Security Technology (ICCST), 1-8, 2019
1972019
Shoulder surfing attack in graphical password authentication
AH Lashkari, S Farmand, D Zakaria, O Bin, D Saleh
International Journal of Computer Science and Information Security (IJCSIS …, 2009
1942009
Detection of doh tunnels using time-series classification of encrypted traffic
M MontazeriShatoori, L Davidson, G Kaur, AH Lashkari
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020
1632020
Towards a network-based framework for android malware detection and characterization
AH Lashkari, AFA Kadir, H Gonzalez, KF Mbah, AA Ghorbani
The 15th IEEE Annual Conference on Privacy, Security and Trust (PST), 233-23309, 2017
1442017
A detailed analysis of the cicids2017 data set
I Sharafaldin, A Habibi Lashkari, AA Ghorbani
Information Systems Security and Privacy: 4th International Conference …, 2019
1412019
Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning
A Habibi Lashkari, G Kaur, A Rahali
Proceedings of the 2020 10th International Conference on Communication and …, 2020
1142020
A boolean model in information retrieval for search engines
AH Lashkari, F Mahdavi, V Ghomi
The International Conference on Information Management and Engineering …, 2009
912009
Didroid: Android malware classification and characterization using deep image learning
A Rahali, AH Lashkari, G Kaur, L Taheri, F Gagnon, F Massicotte
Proceedings of the 2020 10th International Conference on Communication and …, 2020
812020
Detecting Obfuscated Malware using Memory Feature Engineering.
T Carrier, P Victor, A Tekeoglu, AH Lashkari
Icissp, 177-188, 2022
762022
The system can't perform the operation now. Try again later.
Articles 1–20