Arash Habibi Lashkari
Arash Habibi Lashkari
Canada Research Chair and Associate Professor in Cybersecurity @ York University
Verified email at - Homepage
Cited by
Cited by
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
I Sharafaldin, AH Lashkari, AA Ghorbani
The International Conference on Information Systems Security and Privacy …, 2018
Characterization of encrypted and vpn traffic using time-related
G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani
The 2nd international conference on information systems security and privacy …, 2016
Characterization of Tor Traffic using Time based Features
AH Lashkari, GD Gil, MSIMAA Ghorbani
The 3rd International Conference on Information Systems Security and Privacy …, 2017
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy
I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani
2019 International Carnahan Conference on Security Technology (ICCST), 1-8, 2019
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT
R Lu, K Heung, AH Lashkari, AA Ghorbani
IEEE access 5, 3302-3312, 2017
A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i)
AH Lashkari, MMS Danesh, B Samadi
The 2nd IEEE International Conference on Computer Science and Information …, 2009
Towards a reliable intrusion detection benchmark dataset
I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani
Software Networking 2018 (1), 177-200, 2018
An evaluation framework for intrusion detection dataset
A Gharib, I Sharafaldin, AH Lashkari, AA Ghorbani
The IEEE International Conference on Information Science and Security (ICISS …, 2016
Toward developing a systematic approach to generate benchmark android malware datasets and classification
AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani
2018 International Carnahan conference on security technology (ICCST), 1-7, 2018
Shoulder surfing attack in graphical password authentication
AH Lashkari, S Farmand, D Zakaria, O Bin, D Saleh
International Journal of Computer Science and Information Security (IJCSIS …, 2009
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls
L Taheri, AFA Kadir, AH Lashkari
The International Carnahan Conference on Security Technology (ICCST), 1-8, 2019
Detecting malicious urls using lexical analysis
MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani
The International Conference on Network and System Security, 467-482, 2016
Detection of doh tunnels using time-series classification of encrypted traffic
M MontazeriShatoori, L Davidson, G Kaur, AH Lashkari
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020
Towards a network-based framework for android malware detection and characterization
AH Lashkari, AFA Kadir, H Gonzalez, KF Mbah, AA Ghorbani
The 15th IEEE Annual Conference on Privacy, Security and Trust (PST), 233-23309, 2017
A detailed analysis of the cicids2017 data set
I Sharafaldin, A Habibi Lashkari, AA Ghorbani
Information Systems Security and Privacy: 4th International Conference …, 2019
A boolean model in information retrieval for search engines
AH Lashkari, F Mahdavi, V Ghomi
The International Conference on Information Management and Engineering …, 2009
Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning
A Habibi Lashkari, G Kaur, A Rahali
2020 the 10th international conference on communication and network security …, 2020
Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)
AH Lashkari, M Mansoor, AS Danesh
The IEEE International Conference on Signal Processing Systems, 445-449, 2009
Android mobile augmented reality application based on different learning theories for primary school children
B Parhizkar, WK Obeidy, SA Chowdhury, ZM Gebril, MNA Ngan, ...
The International Conference on Multimedia Computing and Systems, 404-408, 2012
WIFI-based indoor positioning system
AH Lashkari, B Parhizkar, MNA Ngan
The 2nd International Conference on Computer and Network Technology, 76-78, 2010
The system can't perform the operation now. Try again later.
Articles 1–20