Arash Habibi Lashkari
Arash Habibi Lashkari
Canada Research Chair and Associate Professor in Cybersecurity @ York University
Verified email at - Homepage
Cited by
Cited by
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
The International Conference on Information Systems Security and Privacy …, 2018
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 international carnahan conference on security technology (ICCST), 1-8, 2019
Characterization of Tor Traffic using Time based Features
AH Lashkari, GD Gil, MSIMAA Ghorbani
The 3rd International Conference on Information Systems Security and Privacy …, 2017
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
The 2nd international conference on information systems security and privacy …, 2016
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
Toward developing a systematic approach to generate benchmark android malware datasets and classification
AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani
2018 International Carnahan conference on security technology (ICCST), 1-7, 2018
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2018 (1), 177-200, 2018
An evaluation framework for intrusion detection dataset
A Gharib, I Sharafaldin, AH Lashkari, AA Ghorbani
The IEEE International Conference on Information Science and Security (ICISS …, 2016
A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i)
AH Lashkari, MMS Danesh, B Samadi
The 2nd IEEE International Conference on Computer Science and Information …, 2009
Characterization of encrypted and VPN traffic using time-related features
GD Gil, AH Lashkari, M Mamun, AA Ghorbani
Proceedings of the 2nd international conference on information systems …, 2016
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
The International Conference on Network and System Security, 467-482, 2016
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls
L Taheri, AFA Kadir, AH Lashkari
The International Carnahan Conference on Security Technology (ICCST), 1-8, 2019
Shoulder surfing attack in graphical password authentication
AH Lashkari, S Farmand, D Zakaria, O Bin, D Saleh
International Journal of Computer Science and Information Security (IJCSIS …, 2009
Detection of doh tunnels using time-series classification of encrypted traffic
M MontazeriShatoori, L Davidson, G Kaur, AH Lashkari
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020
Towards a network-based framework for android malware detection and characterization
AH Lashkari, AFA Kadir, H Gonzalez, KF Mbah, AA Ghorbani
The 15th IEEE Annual Conference on Privacy, Security and Trust (PST), 233-23309, 2017
A detailed analysis of the cicids2017 data set
I Sharafaldin, A Habibi Lashkari, AA Ghorbani
Information Systems Security and Privacy: 4th International Conference …, 2019
Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning
A Habibi Lashkari, G Kaur, A Rahali
Proceedings of the 2020 10th International Conference on Communication and …, 2020
A boolean model in information retrieval for search engines
AH Lashkari, F Mahdavi, V Ghomi
The International Conference on Information Management and Engineering …, 2009
Didroid: Android malware classification and characterization using deep image learning
A Rahali, AH Lashkari, G Kaur, L Taheri, F Gagnon, F Massicotte
Proceedings of the 2020 10th International Conference on Communication and …, 2020
Detecting Obfuscated Malware using Memory Feature Engineering.
T Carrier, P Victor, A Tekeoglu, AH Lashkari
Icissp, 177-188, 2022
The system can't perform the operation now. Try again later.
Articles 1–20