P. K. Danso, H. Molyneaux, A. Zohourian, E. C. P. Neto, D. Whalen, S. Dadkhah, and A. A. Ghorbani, "Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment," in Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. Jul. 2023.
G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, "Understanding Cybersecurity Risk in FMI using HPC,” in Cybersecurity & High-Performance Computing Environments, Taylor and Francis, 2022.
H. Azimy and A. Ghorbani. “Alternative Difficulty Adjustment Algorithms for Preventing Selfish Mining Attack,” in Blockchain – ICBC 2021 Lecture Notes in Computer Science, vol 12991, K. Lee and L. J. Zhang, Eds. Cham: Springer, 2022.
C. L. Chowdhary, M. Alazab, A. Chaudhary, S. Hakak, and T. R. Gadekallu, Eds, Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches: Fundamentals, technologies and applications: Institution of Engineering and Technology, 2021.
G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends, Switzerland: Springer International Publishing, 2021.
G. Kaur and A. Habibi Lashkari, "Information Technology Risk Management,” in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds. Cham: Springer, 2021.
G. Kaur and A. Habibi Lashkari, "An Introduction to Security Operations," in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds. Cham: Springer, 2021.
X. Zhang and A. A. Ghorbani, "Human Factors in Cybersecurity: Issues and Challenges in Big Data," in Security, Privacy, and Forensics Issues in Big Data, IGI Global, pp 66-96, 2020.
N. Stakhanova, and A. A. Cardenas, "Analysis of Metrics for Classification Accuracy in Intrusion Detection," in Empirical Research for Software Security: Foundations and Experience, L. Othmane, M. G. Jaatun, and E. Weippl, Eds. Boca Raton: CRC Press, 2018.
A. A. Kadir, N. Stakhanova, and A. A. Ghorbani, "An empirical analysis of Android banking malware," in Protecting Mobile Networks and Devices: Challenges and Solutions, W. Meng, X. Luo, J. Zhou, and S. Furnell, Eds. New York: Auerbach Publications, 2017.
H. Gonzalez, M.-A. Gosselin-Lavigne, N. Stakhanova, and A. A. Ghorbani, "The impact of application layer denial of service attacks," in Case Studies in Secure Computing - Achievements and Trends, B. Issac and N. Israr, Eds. New York: Auerbach Publications, 2015.
P. Kabiri and A. A. Ghorbani, "Dimension reduction and its effects on Clustering for Intrusion Detection," in Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, P. Kabiri, Ed. IGI Global, 2011.
A. A. Ghorbani, W. Lu, and M. Tavallaee, "Network Intrusion Detection and Prevention - Concepts and Techniques, Springer Series," in Advances in Information Security Series, Vol.47. New York: Springer-Verlag US, 2010.
These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.
Y. Kim, S. Hakak, and A. Ghorbani, "Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure," in Computers & Security, v. 144, Sep. 2024.
M. Rabbani, L. Rashidi, and A. A. Ghorbani, "A Graph Learning-Based Approach for Lateral Movement Detection," in IEEE Transactions on Network and Service Management, Jun. 2024.
X. Zhang, R. Razavi-Far, H. Isah, A. David, G. Higgins, R. Lu, and A. A. Ghorbani, "Area in circle: A novel evaluation metric for object detection," Knowledge-Based Systems, v. 293, Jun. 2024.
K. Boakye-Boateng, A. A.Ghorbani, and A. H. Lashkari, "Implementation of a Trust-Based Framework for Substation Defense in the Smart Grid," Smart Cities , v. 7, pp. 99-140, Jan. 2024.
E. C. P. Neto, S. Dadkhah, S. Sadeghi, H. Molyneaux, and A. Ghorbani, "A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective," in Computer Communications (ScienceDirect), v. 213, pp. 61-77, Jan. 2024.
T. Sasi, A. H. Lashkari, R. Lu, P. Xiong, and S. Iqbal, "A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges," in Journal of Information and Intelligence, Dec. 2023.
E. Alkhateeb, A. Ghorbani, and A. Habibi Lashkari, "A survey on run-time packers and mitigation techniques," in International Journal of Information Security, Nov. 2023.
B. Jamshidi, S. Hakak and R. Lu, "A Self-Attention Mechanism-Based Model for Early Detection of Fake News," in IEEE Transactions on Computational Social Systems, pp. 1-12, Oct. 2023.
S. Dadkhah, X. Zhang, A. G. Weismann, A. Firouzi and A. A. Ghorbani, "The Largest Social Media Ground-Truth Dataset for Real/Fake Content: TruthSeeker," in IEEE Transactions on Computational Social Systems, v. 99, pp. 1-15, Oct. 2023.
S. Shirvani, Y. Baseri, and A. Ghorbani, "Evaluation Framework for Electric Vehicle Security Risk Assessment," in IEEE Transactions on Intelligent Transportation Systems, Early Access, Sep. 2023.
P. K. Danso, S. Dadkhah, E. C. P. Neto, A. Zohourian, H. Molyneaux, R. Lu, and A. A. Ghorbani, "Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification," in IEEE Internet of Things Journal, Early Access, Jul. 2023.
B. Kaur, S. Dadkhah, F. Shoeleh, E. C. P. Neto, P. Xiong, S. Iqbal, P. Lamontagne, S. Ray, and A. A. Ghorbani, “Internet of Things (IoT) security dataset evolution: Challenges and future directions,” in Internet of Things, v. 22, Jul. 2023.
H. Taslimasa, S. Dadkhah, E. C. P. Neto, P. Xiong, S. Ray, and A. A. Ghorbani, "Security issues in Internet of Vehicles (IoV): A comprehensive survey," in Internet of Things,100809, May 2023.
S. Mahdavifar and A. A. Ghorbani, "CapsRule: Explainable Deep Learning for Classifying Network Attacks," in IEEE Transactions on Neural Networks and Learning Systems, Early Access, pp. 1-15, Apr. 2023.
A. Zohourian, S. Dadkhah, E.C.P. Neto, H. Mahdikhani, P. K. Danso, H. Molyneaux, and A. A. Ghorbani, "IoT Zigbee device security: A comprehensive review," in Internet of Things, 100791, Apr. 2023.
Mohammadian, A. A. Ghorbani, and A. H. Lashkari, "A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems," in Applied Soft Computing, 110173, Mar. 2023.
X. Zhang, S. Dadkhah, A. G. Weismann, M. A. Kanaani, and A. A. Ghorbani, "Multimodal Fake News Analysis Based on Image–Text Similarity," in IEEE Transactions on Computational Social Systems, Early Access, pp. 1-14, Feb. 2023.
H. Azimy, A. A. Ghorbani, and E, Bagheri, “Preventing proof-of-work mining attacks,” Information Sciences, vol. 608, pp. 1503-1523, 2022.
Y. Kim, S. Hakak, and A. Ghorbani, “Smart grid security: attacks and defence techniques,” IET Smart Grid, pp. 1-21, 2022.
H. Mohammadian, A. Habibi Lashkari, and A. Ghorbani, “Evaluating Deep Learning-based NIDS in Adversarial Settings,” 8th International Conference on Information Systems Security and Privacy, pp. 435-444. 2022.
X. Zhang, M. M. Yadollahi, S. Dadkhah, H. Isah, D. P. Le, and A. A. Ghorbani, “Data breach: analysis, countermeasures and challenges,” International Journal of Information and Computer Security, vol 19, no. 3-4, pp. 402-442, 2022.
X. Zhang, S. Dadkhah, S. Mahdavifar, R. Lu, and A. A. Ghorbani, “An entity matching-based image topic verification framework for online fact-checking,” International Journal of Multimedia Intelligence and Security, vol. 4, no 1, pp. 65-85, 2022.
M. Y. Aldarwbi, A. H. Lashkari, and A. A. Ghorbani. "The sound of intrusion: A novel network intrusion detection system," Computers and Electrical Engineering, vol. 104, part A, 108455, 2022.
K. Boakye-Boateng, A. A. Ghorbani, and A. H. Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal," Journal of Sensor and Actuator Networks, 11, no. 3: 34, 2022.
M. D. Firoozjaei, N. Mahmoudyar, Y. Baseri, and Ali A Ghorbani. "An evaluation framework for industrial control system cyber incidents," International Journal of Critical Infrastructure Protection, vol. 36, 100487, 2022.
S. Mahdavifar, F. Deldar, and H Mahdikhani. "Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points," Journal of Network and Systems Management, vol. 30, no. 1, pp. 1-42, 2022.
M. Safi, S. Dadkhah, F. Shoeleh, H. Mahdikhani, H. Molyneaux, and A. A. Ghorbani, “A Survey on IoT Profiling, Fingerprinting, and Identification,” ACM Transactions on Internet of Things, vol. 3, no. 4, pp. 1-39, Nov. 2022.
M. Al-darwbi, A. Ghorbani, and A. Lashkari, “DGL22: A practical Quantum key distribution,” Research Square, Oct. 2022.
M. Y. Al-Darwbi, A. A. Ghorbani, and A. H. Lashkari, “QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution,” IEEE Access, vol. 10, pp. 107685-107702, Oct. 2022.
M. Safi, S. Dadkhah, F. Shoeleh, H. Mahdikhani, H. Molyneaux, and A. A. Ghorbani, “A Survey on IoT Profiling, Fingerprinting, and Identification,” ACM Transactions on Internet of Things, vol. 3, no. 4, article no. 26, pp. 1-39, Sep. 2022.
K. Mandal, “Cryptographic Pseudorandom Noise Generators for Lattice-based Cryptography and Differential Privacy,” 10th International Workshop on Signal Design and Its Applications in Communications (IWSDA), pp. 1-4, Aug. 2022.
W. Shahid, B. Jamshidi, S. Hakak, H. Isah, W. Z. Khan, M. K. Khan, and K. K. R. Choo, “Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities,” IEEE Transactions on Computational Social Systems, Jun. 2022.
X. Zhang, R. Lu, J. Shao, F. Wang, H. Zhu, and A. A. Ghorbani, “FedSky: an efficient and privacy-preserving scheme for federated mobile crowdsensing,” IEEE Internet of Things Journal, vol. 9, no. 7, pp. 5344-5356, Apr. 2022.
W. Shahid, Y. Li, D. Staples, G. Amin, S. Hakak and A. Ghorbani, "Are You a Cyborg, Bot or Human? -A Survey on detecting fake news spreaders," in IEEE Access, early access, Mar. 2022.
X. Zhang, M. M. Yadollahi, S. Dadkhah, H. Isah, D. P. Le, and A. A. Ghorbani, “Data breach: analysis, countermeasures and challenges,” International Journal of Information and Computer Security, vol. 19, no 3-4, pp. 402-442, 2021.
X. Zhang, A. Habibi Lashkari, and A. A. Ghorbani, “Classifying and clustering malicious advertisement uniform resource locators using deep learning,” Computational Intelligence, vol. 37, pp. 511-537, 2021.
X. Zhang, R. Lu, J. Shao, and A. A. Ghorbani. “Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing,” IEEE Internet of Things Journal, vol. 16, no. 8, 2021.
M. Y. Aldarwbi, A. A. Ghorbani, and A. H. Lashkari, "KeyShield: A scalable and quantum-safe key management scheme," IEEE Open Journal of the Communications Society, vol. 2, pp. 87-101, 2021.
K. Boakye-Boateng, A. A. Ghorbani, and A. Lashkari, "A Novel Trust Model In Detecting Final-Phase Attacks in Substations,"18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 1-11, Dec. 2021
C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, and M. K. Khan, “Ransomware: Recent Advances, Analysis, Challenges and Future Research Directions,” Computers and Security, vol. 11, Dec. 2021.
D. P. Sharma, B. Kaur, F. Shoeleh, M. Erfani, DP. Le, A. H. Lashkari, and A. A. Ghorbani, "Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management,"15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2021), Athens, Greece, pp. 82-87, Nov. 2021.
M. M. Yadollahi, F. Shoeleh, S. Dadkhah, and A. A. Ghorbani. "Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency," Sixth IEEE Cyber Science and Technology Congress, Oct. 2021.
S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A memory-based game-theoretic defensive approach for digital forensic investigators," Forensic Science International: Digital Investigation, vol. 38, Sep. 2021.
M. A. Jarwar, S. A. Khowaja, K. Dev, M. Adhikari, and S. Hakak, "NEAT: A Resilient Deep Representational Learning for Fault Detection using Acoustic Signals in IIoT Environment," IEEE Internet of Things Journal, Early Access, Sep. 2021.
P. K. Reddy Maddikunta, S. Hakak, M. Alazab, S. Bhattacharya, T. R. Gadekallu, W. Z. Khan, and Q. -V. Pham, "Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges," IEEE Sensors Journal, vol. 21, no. 16, pp. 17608-17619, Aug. 2021.
H. Ghayvat, S. N. Pandya, P. Bhattacharya, M. Zuhair, M. Rashid, S. Hakak, S., and K. Dev, "CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications," IEEE Journal of Biomedical and Health Informatics, Early Access, Jul. 2021.
S. Dadkhah, F. Shoeleh, M. M. Yadollahi, X. Zhang, and A. A. Ghorbani, “A real-time hostile activities analyses and detection system,” Applied Soft Computing, vol. 104, 107175, Jun. 2021.
W. Khan, S. Hakak, and M. K. Khan, “Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges,” IEEE Internet of Things, vol. 8, no. 10, May 2021.
S. Hakak, M. Alazab, S. Khan, T. R. Gadekallu, P. K. R. Maddikunta, and W. Z. Khan, “An ensemble machine learning approach through effective feature extraction to classify fake news,” Future Generation Computer Systems, vol. 117, pp. 47-58, Apr. 2021.
H. Mahdikhani, R. Lu, J. Shao, and A. Ghorbani, “Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4762-4774, Mar. 2021.
X. Zhang, A. H. Lashkari, and A. A. Ghorbani, "Classifying and clustering malicious advertisement uniform resource locators using deep learning," Computational Intelligence, vol. 37, no. 1, pp. 511-537, Feb. 2021.
S. Mahdavifar and A. A. Ghorbani, "DeNNeS: Deep Embedded Neural Network Expert System for Detecting Cyber Attacks," Neural Computing and Applications, vol. 32, pp. 14753–14780, 2020.
S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents’ behaviour,” Forensic Science International: Digital Investigation, vol. 35, pp. 301024, 2020.
P. A. Bonatti, L. Ioffredo, I. M. Petrova, L. Sauro, and I. R. Siahaan, "Real-time reasoning in OWL2 for GDPR compliance," Artificial Intelligence, vol. 289, art. 103389, Dec. 2020.
X. Zhang, R. Lu, J. Shao, and A. A. Ghorbani, "Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS," IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11524-11535, Dec. 2020.
S. L. Yeo, D-P. Le, and K. Khoo, “Improved Algebraic Attacks on Lightweight Block Ciphers,” Journal of Cryptographic Engineering, Nov. 2020.
H. Mahdikhani, R. Lu, J. Shao, and A. Ghorbani, “Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4762-4774, Oct. 2020.
D-P. Le and A. A. Ghorbani, “Memory-Efficient Random Order Exponentiation Algorithm,” IEEE Access, vol. 8, pp. 146923-146931, Aug. 2020.
H. Mahdikhani, R. Lu, Y. Zheng, J. Shao, and A. Ghorbani, “Achieving O(log^3n) Communication-Efficient Privacy-Preserving Range Query in Fog-based IoT,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5220-5232, Jun. 2020.
Hakak, W. Z. Khan, M. Imran, K. -K. R. Choo and M. Shoaib, “Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies,” IEEE Access, vol. 8, pp. 124134-124144, Jun. 2020.
X. Zhang and A. A. Ghorbani, "An overview of online fake news: Characterization, detection, and discussion," Information Processing and Management, vol. 57, no. 2, pp. 102025, Mar. 2020.
S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A game-theoretic defensive approach for forensic investigators against rootkits," Forensic Science International: Digital Investigation, vol. 32, Mar. 2020.
H. Mahdikhani, R. Shahsavarifar, R. Lu, and D. Bremner, “Achieve Privacy-Preserving Simplicial Depth Query over Collaborative Cloud Servers,” Peer-to-Peer Networking and Applications, vol. 13, no. 1, pp. 412-423, Jan. 2020.
H. Mahdikhani, S. Mahdavifar, R. Lu, H. Zhu and A. A. Ghorbani, “Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT,” IEEE Access, vol. 7, pp. 184438-184447, 2019.
B. Li, R. Lu, G. Xiao, H. Bao and A. A. Ghorbani, "Towards insider threats detection in smart grid communication systems," IET Communications, vol. 13(12), pp. 1728-1736, 2019.
S. Mahdavifar and A. A. Ghorbani, "Application of deep learning to cybersecurity: A survey," Neurocomputing, vol. 347, pp. 149-176, 2019.
I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, "An evaluation framework for network security visualizations," Computers and Security, vol. 84, pp. 70-92, Mar. 2019.
W. Guo, J. Shao, R. Lu, Y. Liu, and A. A. Ghorbani, "A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment," IEEE Access, vol. 6, pp. 48946-48957, 2018.
A. H. Lashkari, M. Chen, and A. A. Ghorbani, "A Survey on User Profiling Models for Anomaly Detection in Cyberspace," Journal of Cyber Security and Mobility, vol. 2, 2018.
C. Zhang, L. Zhu, C. Xu, and R. Lu, "PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system," Future Generation Computer Systems, vol. 79, pp. 16-25, 2018.
I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "Towards a Reliable Intrusion Detection Benchmark Dataset," Software Networking Journal, vol. 2017, iss. 1, pp. 177-200, Jan. 2018.
C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning," IEEE Access, vol. 5, pp. 26973 - 26989, 2017.
K. F. Mbah, A. H. Lashkari, and A. A. Ghorbani, "A Phishing Email Detection Approach Using Machine Learning Techniques," World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, vol. 4, no. 1, 2017.
O. Osanaiye, S. Chen, Z. Yan, R. Lu, R. Choo, and M. Dlodlo, "From Cloud to Fog Computing: A Review and A Conceptual Live VM Migration Framework," IEEE Access, vol. 5, pp. 8284-8300, 2017.
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017.
C. Huang, R. Lu, and R. Choo, "Secure and flexible cloud-assisted association tule mining over horizontally partitioned databases," Journal of Computer and System Sciences, vol. 89, pp. 51-63, Nov. 2017.
C. Huang, R. Lu, and K. K. Choo, "Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges," IEEE Communications Magazine, vol. 55, no. 11, pp. 105-111, Nov. 2017.
H. H. Jazi, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Detecting HTTP-based Application Layer DoS attacks on Web Servers in the presence of sampling," Computer Networks, vol. 121, pp. 25-36, Jul. 2017.
C. Huang, R. Lu, and H. Zhu. "Privacy-Friendly Spatial Crowdsourcing in Vehicular Networks," Journal of Communications and Information Networks, vol. 2, no. 2, pp. 59-74, Jun. 2017.
G. Mantas, N. Stakhanova, H. Gonzalez, H. H. Jazi, and A. A. Ghorbani, "Application-layer denial of service attacks: taxonomy and survey," International Journal of Information and Computer Security, vol. 7, no. 2/3/4, pp. 216-239, Nov. 2015.
A. J. Alzahrani, N. Stakhanova, H. Gonzalez, and A. A. Ghorbani, "Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones," Journal of Cyber Security and Mobility, vol. 3, iss. 2, pp. 89-132, Apr. 2014.
J. L. Rrushi and A. Ghorbani, "A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management," Journal of Computer Virology and Hacking Techniques, vol. 10, pp. 29-51, 2013.
D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani, and D. Garant, "Botnet Detection based on Traffic Behaviour Analysis and Flow Intervals," Computer and Security, vol. 39, pt. A, pp. 2-16, Nov. 2013.
M. Bateni, A. Baraani, A. Ghorban, "Using Artificial Immune System and Fuzzy Logic for Alert Correlation," International Journal of Network Security, vol. 15, no. 3, pp. 190-204, May 2013.
M. Bateni, A. Baraani, A. Ghorbani, and A. Rezaei, "An AIS-inspired Architecture for Alert Correlation," International Journal of Innovative Computing, Information and Control, vol. 9, no. 1, pp. 231-255, Jan. 2013.
H. Shiravi, A. Shiravi, and A. A. Ghorbani, "A Survey of Visualization Systems for Network Security," IEEE Transactions on Visualization and Computer Graphics, vol. 18, no. 8, pp. 1313-1329, Aug. 2012.
M. Bateni, A. Baraani, and A. Ghorbani, "Alert Correlation using Artificial Immune Recognition System," International Journal of Bio-Inspired Computation, vol. 4, iss. 3, pp. 181-195, Jun. 2012.
M. Soleimani and A. A. Ghorbani, "Multi-layer episode filtering for the multi-step attack detection," Computer Communications, vol. 35, iss. 11, pp. 1368-1379, Jun. 2012.
M. Bateni, A. Baraani, A. Ghorbani, and A. Rezaei, "Alert Correlation using Artificial Immune Recognition System," International Journal of Bio-Inspired Computation, vol. 4, iss. 3, pp.181-195, Jun. 2012.
Lei and A. A. Ghorbani, "Improved Competitive Learning Neural Networks for Network Intrusion and Fraud Detection," Neurocomputing, vol. 75, iss. 1, pp. 135-145, Jan. 2012.
J. Rrushi, E. Mokhtari, and A. A. Ghorbani, "Estimating Botnet Virulence within Mathematical Models of Botnet Propagation Dynamics," Computers and Security, vol. 30, iss. 8, pp. 791-802, Nov. 2011.
W. Lu, G. Rammidi, and A. A. Ghorbani, "Clustering Botnet Communication Traffic Based on N-gram Feature Selection," Computer Communications, vol. 34, no. 3, pp. 502-514, Mar. 2011.
W. Lu, G. Rammidi, and A. A. Ghorbani. "Clustering Botnet Communication Traffic Based on N-gram Feature Selection," Computer Communications, vol 34, iss. 3, pp. 502-514, Mar. 2011.
L. Wang, A. A. Ghorbani, and Y. Li, "Automatic Discovery of Multistep Attack Patterns," International Journal of Network Security, vol. 10, no. 2, pp. 142-152, 2010.
Y. Lin, M. D. McCool, and A. A. Ghorbani, "Time Series Motif Discovery and Anomaly Detection Based on Subseries Join," IAENG International Journal of Computer Science, vol. 34, no. 3, pp. 502-514, 2010.
M. Tavallaee, N. Stakhanova, and A. A. Ghorbani, "Toward Credible Evaluation of Anomaly-based Intrusion Detection Methods," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 40, no. 5, pp. 516-524, Sep. 2010.
R. Sadoddin and A. A. Ghorbani, "An Incremental Frequent Structure Mining Framework for Real-time Alert Correlation," Computers and Security, vol. 28, iss 3-4, pp. 153-173, May-Jun. 2009.
W. Lu and A. A. Ghorbani. "Network Anomaly Detection Based on Wavelet Analysis," EURASIP Journal on Advances in Signal Process, no. 837601, Jun. 2008.
H. Nayyar and A. A. Ghorbani. "Approximate Autoregressive Modeling for Network Attack Detection," Journal of Computer Security, vol. 16, no. 2, pp.165-197, Apr. 2008.
I.-V. Onut and A. A. Ghorbani, "A Feature Classification Scheme For Network Intrusion Detection," International Journal of Network Security, vol. 5, no. 1, pp. 1-15, Jul. 2007.
I.-V. Onut and A. A. Ghorbani, "SVision: A novel Visual Network-anomaly identification technique," Computers and Security, vol. 26, no. 3, pp. 201-212, May 2007.
B. Zhu and A. A. Ghorbani, "Alert Correlation for Extracting Attack Strategies," International Journal of Network Security, vol. 3, no. 3, pp. 244-258, Nov. 2006.
M. Nadjarbashi-Noghani and A. A. Ghorbani, "A Taxonomy of Attacks with Applications to Diversity Based Intrusion Detection," Journal of Information Assurance and Security, vol. 1. iss. 3, pp. 217-232, Sep. 2006.
P. Kabiri and A. A. Ghorbani, "Research on Intrusion Detection and Response: A Survey," International Journal of Network Security, vol. 1, no. 2, pp. 84-102, Sep. 2005.
These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.
M. Kanaani, S. Dadkhah, and A. A. Ghorbani, "Triple-R: Automatic Reasoning for Fact Verification Using Language Models," 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024), Torino (Italia), pp. 16831–16840, May. 2024.
V. P. Vikraman Pillai, Z. Zhou, S. Zhang, R. Lu, and M. Mamun, "An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems," 2023 IEEE/CIC International Conference on Communications in China (ICCC), Dalian, China, pp. 1-6, Aug. 2023.
K. Boakye-Boateng, A. A. Ghorbani, and A. H. Lashkari, "Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach," 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, pp. 1-12, Aug. 2023.
Y. Kim, S. Hakak, and A. A. Ghorbani, "DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure," 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, pp. 1-9, Aug. 2023.
R. Hussain Khokhar, S. Dadkhah, T. Zhao, X. Zhang, and A. A. Ghorbani, "UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor," 20th Annual International Conference on Privacy, Security and Trust (PST), Copenhagen, Denmark, pp. 1-11, Aug. 2023.
L. Rashidi, W. H. Rankothge, H. Mohammadian, R. H. Khokhar, B. Frei, S. Ellis, and L. Freitas, "Securing Supply Chain: A Comprehensive Blockchain-based Framework and Risk Assessment," the 20th International Conference on Privacy, Security, and Trust (PST2023), Copenhagen, Denmark, pp. 1-10, Aug. 2023.
H. Taslimasa, S. Dadkhah, E. C. P. Neto, P. Xiong, S. Iqbal, S. Ray, and A. A. Ghorbani, "ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus Protocol," 2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), New York, NY, USA, pp. 122-129, May 2023.
E. C. P. Neto, S. Dadkhah, and A. A. Ghorbani, "Sustainable and Secure Optimization of Load Distribution in Edge Computing," IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Marietta, GA, USA, pp. 040-045, Dec. 2022.
P. K. Danso, E. C. P. Neto, S. Dadkhah, A. Zohourian, H. Molyneaux, and A. A. Ghorbani, "Ensemble-based Intrusion Detection for Internet of Things Devices," 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Marietta, GA, USA, pp. 034-039, Dec. 2022.
M. Abrishami, S. Dadkhah, E. C. P. Neto, P Xiong, S. Iqbal, S. Ray, A. A. Ghorbani, "Label Noise Detection in IoT Security based on Decision Tree and Active Learning," 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Marietta, GA, USA, pp. 046-053, Dec. 2022.
S. Zhang, S. Ray, R. Lu, and Y. Guan, “PPsky: Privacy-Preserving Skyline Queries with Secret Sharing in eHealthcare,” IEEE Global Communications Conference, Rio de Janeiro, Brazil, Dec. 2022. Best Paper Award Winner.
X. Zhang, R. Lu, S. Zhang, S. Ray, and A. A. Ghorbani, “Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints,” ICC 2022-IEEE International Conference on Communications, Republic of Seoul, Korea, pp. 4384-4389, May 2022.
M. Abrishami, S. Dadkhah, E. C. P. Neto, P. Xiong, S Iqbal, S. Ray, and A. Ghorbani. "Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study," 32nd Conference of Open Innovations Association (FRUCT), pp. 3-14, 2022.
E. C. P. Neto, S. Dadkhah, and A. A. Ghorbani, "Collaborative DDoS Detection in Distributed Multi-Tenant IoT using Federated Learning,” 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1-10, 2022.
S. Dadkhah, H. Mahdikhani, P. K. Danso, A. Zohourian, K. A. Truong, and A. A. Ghorbani, "Towards the Development of a Realistic Multidimensional IoT Profiling Dataset,” 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1-11, 2022.
X. Zhang, S. Zhang, S. Ray, and A. A. Ghorbani, "Efficient and Privacy-preserving Worker Selection in Mobile Crowdsensing Over Tentative Future Trajectories," 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1-8, 2022.
Y. Guan, P. Xiong, S. Zhang, and R. Lu, "Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing," GLOBECOM 2022 - 2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, pp. 4854-4859, 2022.
P. D. Keyes, B. Li, G. Kaur, A. Lashkari, "Entroplyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics," Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.
A. Lashkari, B. Li, T. Carrier, and G. Kaur, “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering,” Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.
M. M. Yadollahi, A. H. Lashkari, and A. A. Ghorbani, "Towards Query-efficient Black-box Adversarial Attack on Text Classification Models," 2021, 18th International Conference on Privacy, Security and Trust, pp. 1-7, 2021.
M. M. Yadollahi, F. Shoeleh, S. Dadkhah, and A. A. Ghorbani, “Robust black-box watermarking for deep neural network using inverse document frequency,” IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, pp. 574-581, 2021.
X. Zhang, R. Lu, S. Ray, J. Shao, and A. A. Ghorbani, “Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing,” IEEE Global Communications Conference (GLOBECOM), pp. 1-6, 2021.
M. Safi, B. Kaur, S. Dadkhah, F. Shoeleh, A. H. Lashkari, H Molyneaux, and A. A. Ghorbani, “Behavioural Monitoring and Security Profiling in the Internet of Things (IoT),” IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), pp. 1203-1210, Dec. 2021.
B. Kaur, S. Dadkhah, P. Xiong, S. Iqbal, S. Ray, and A. A. Ghorbani, “Verification Based Scheme to Restrict IoT Attacks,” IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies (BDCAT'21), pp. 63-68, Dec. 2021.
M. Safi, B. Kaur, S. Dadkhah, F. Shoeleh, A. H. Lashkari, H. Molyneaux, and A. A. Ghorbani, “Behavioural Monitoring and Security Profiling in the Internet of Things (IoT),” IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Haikou, Hainan, China, pp. 1203-1210, Dec. 2021.
F. Shoeleh, M. Erfani, S. S. Hasanabadi, D. P. Le, A. H. Lashkari, A. Frank, and A. A. Ghorbani, “User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security,” 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 1-10, Dec. 2021.
B. Kaur, S. Dadkhah, P. Xiong, S. Iqbal, S. Ray, and A. A. Ghorbani, “Verification Based Scheme to Restrict IoT Attacks,” IEEE/ACM 8th International Conference on Big Data Computing, Applications and Technologies (BDCAT'21), pp. 63-68, Dec. 2021.
K. Boakye-Boateng, I. S. R. Siahaan, A. H. Al Muktadir, D. Xu and A. A. Ghorbani, "Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection," 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Espoo, Finland, Oct. 2021.
M. Erfani, F. Shoeleh, S. Dadkhah, B. Kaur, P. Xiong, S. Iqbal, S. Ray, and A. A. Ghorbani, “A feature exploration approach for IoT attack type classification,” IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp. 582-588, Oct. 2021.
M. Erfani, F. Shoeleh, S. Dadkhah, B. Kaur, P. Xiong, S. Iqbal, S. Ray, and A. A. Ghorbani, “A feature exploration approach for IoT attack type classification,” IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Alberta, Canada, pp. 582-588, Oct. 2021.
K. Boakye-Boateng. A. A. Ghorbani, and A. H. Lashkari, "RiskISM: A Risk Assessment Tool for Substations," 2021 IEEE 9th International Conference on Smart City and Informatization (iSCI) 2021, Shenyang, China, Oct. 2021.
N. Mashtalyar, T. Santos, U. N. Ntaganzwa, S. Hakak, and S. Ray, "Social Engineering Attacks: Recent Advances and Challenges," 23rd International Conference on Human-Computer Interaction, Washington, DC, Jul. 2021.
A. H. Al Muktadir, I. S. R. Siahaan, K. Boakye-Boateng, D. Xu, and A. A. Ghorbani, "Recommending Location for Placing Data Collector in the OPC Classic," 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Victoria, BC, May 2021.
X. Zhang, S. Ray, F. Shoeleh, and R. Lu, “Efficient Contact Similarity Query over Uncertain Trajectories,” Proceedings of the 24th (EDBT) International Conference on Extending Database Technology, Nicosia, Cyprus, Mar. 2021.
Y. Fei, G. Gong, C. Gongye, K. Mandal, R. Rohit, T. Xu, Y. Yi, and N. Zidaric, “Correlation Power Analysis and Higher-order Masking Implementation of WAGE,” Selected Areas in Cryptography (SAC) 2020, Halifax, NS, 2020.
K. Mandal and G. Gong, “Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography,” NIST Lightweight Cryptography Workshop 2020, Gaithersburg, MD, 2020.
F. Shoeleh, M. Erfani, D.-P. Le, and A. A. Ghorbani, "Ensemble of Hierarchical Temporal Memory for Anomaly Detection," 2020 IEEE Seventh International Conference on Data Science and Advanced Analytics (DSAA), Sydney, Australia, pp. 50-59, 2020.
S. Hakak, S. Ray, W. Z. Khan, and E. Scheme, “A Framework for Edge-Assisted Healthcare Data Analytics using Federated Learning” IEEE International Conference on Big Data (IEEE BigData 2020) - International Workshop on DASH 2020: Data Analytics for Smart Health, Atlanta, GA, Dec. 2020.
S. Hakak, W. Z. Khan, S. Bhattacharya, G. T. Reddy, and K.-K. R. Choo “Propagation of Fake News Using Social Media: Mitigation and Research Challenges”, Ninth International Conference on Computational Data and Social Networks, Dallas, TX, pp. 345-353, Dec. 2020.
G. Kaur, A. H. Lashkari, A. Rahali, L. Taheri, and F. Gagnon, "DIDroid: Android Malware Classification and Characterization Using Deep Image Learning," 2020 the tenth International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.
A. H. Lashkari, G. Kaur, and A. Rahali, “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Encrypted Traffic using Deep Image Learning,” 2020 the tenth International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.
D.-P. Le, "Synthetic Data Generation and Evaluation," 2020 Serene-risc Workshop (Online), Oct. 2020.
M. Erfani, F. Shoeleh, and A. A. Ghorbani, “Financial Fraud Detection using Deep Support Vector Data Description,” IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA , pp. 2274-2282, Dec. 2020.
S. Mahdavifar, A. F. A. Kadir, R. Fatemi, D. Alhadidi, and A. A. Ghorbani, “Dynamic Android Malware Category Classification Using Semi-Supervised Deep Learning,” IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), Calgary, AB, pp. 515-522, Aug. 2020.
G. Kaur, A. H. Lashkari, and A. Rahali, "Intrusion Traffic Detection and Characterization using Deep Image Learning," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, pp. 55-62, Aug. 2020.
M. MontazeriShatoori, L. Davidson, G. Kaur, and A. H. Lashkari, "Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, Calgary, AB, pp. 63-70, Aug. 2020.
H. Mahdikhani, R. Lu, Y. Zheng, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1-6, Jun. 2020.
D.-P. Le, G. Yang, and A. A. Ghorbani, "A New Multisignature Scheme with Public Key Aggregation for Blockchain," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-7, 2019.
S. Linoy, H. Mahdikhani, S. Ray, R. Lu, N. Stakhanova, and A. Ghorbani, “Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain,” 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, pp. 398-404, 2019.
X. Zhang, R. Lu, J. Shao, H. Zhu, and A. A. Ghorbani, "Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing," 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, pp. 1-6, 2019.
H. Azimy and A. Ghorbani, "Competitive Selfish Mining," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-8, 2019.
X. Zhang, A. H. Lashkari, N. Maleki, J. F. Mudge, and A. A. Ghorbani, "Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network," 2019 International Conference on Security and Management (SAM'19), Las Vegas, NV, pp. 208-215, Nov. 2019.
I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,” 2019 International Carnahan Conference on Security Technology Chennai (ICCST), India, pp. 1-8, Oct. 2019.
K. Boakye-Boateng and A. H. Lashkari, "Securing GOOSE: The Return of One-Time Pads," 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, Oct. 2019.
A. H. Lashkari, L. Taheri, A. Fitriah, and A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-7, 2018.
S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-6, 2018.
N. Yekta and R. Lu, "XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
M. Wen, D. Yao, B. Li, and R. Lu, "State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, "Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.
I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," Fourth International Conference on Information Systems Security and Privacy (ICISSP), Portugal, pp. 108-116, Jan. 2018.
H. Mahdikhani and R. Lu, "Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
A. H. Lashkari, A. F. A. Kadir, H. Gonzalez, K. F. Mbah, and A. A. Ghorbani, "Towards a Network-Based Framework for Android Malware Detection and Characterization," 2017. 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, pp. 233-23309, 2017.
B. Li, R. Lu, and G. Xiao, "HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
S. Zhang, H. Li, Y. Dai, M. He, and R. Lu, "EPP-DMM: an Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
N. I. Yekta and R. Lu, "PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things," 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.
Q. Kong, M. Ma, and R. Lu, "Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks", 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.
A. H. Lashkari, G. D. Gil, J. E. Keenan, K. F. Mbah, and A. A. Ghorbani, "A New Evaluation framework for Network Traffic base Botnet Detection Methods," Seventh International Conference on Communication and Network Security (ICCNS 2017), Japan, pp. 59-66, 2017.
A. Gharib and A. Ghorbani, "DNA-Droid: A Real-Time Android Ransomware Detection Framework," International Conference on Network and System Security (NSS 2017), Helsinki, Finland, pp. 184-198, 2017.
A. H. Lashkari, A. Seo, G. D. Gil, and A. Ghorbani, "CIC-AB: Online Ad Blocker for Browsers," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-7, 2017.
I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "BotViz: A Memory Forensic-Based Botnet Detection and Visualization Approach," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-8, 2017.
F. Wang, H. Zhu, R. Lu, F. Liu, C. Huang, and H. Li, "Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications," SecureComm 2017: Security and Privacy in Communication Networks, Niagara Falls, pp. 339-355, Oct. 2017.
R. Lu, "How to Achieve Efficient Range Query over Encrypted Data in Cloud", 2nd International Workshop on Mobile Communications and Networking (IWMCN), 2017, Waterloo, ON, Sep. 2017.
X. Zhang, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Online Advertising Classification System Using Lexical-based Features," 14th International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, pp. 486-494, Jul. 2017.
S. Chen, R. Lu, and J. Zhang, "A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment," 11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, Sweden, Jun. 2017.
A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, "Characterization of Tor Traffic Using Time-Based Features," Third International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal, pp. 253-262, Feb. 2017.
A. Gharib, I. Sharafaldin, A. H. Lashkari, and A, A. Ghorbani, "An Evaluation Framework for Intrusion Detection Dataset," 2016. International Conference on Information Science and Security (ICISS), Pattaya, Thailand, pp. 1-6, 2016.
H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Measuring code reuse in Android apps," 2016. 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 187-195, 2016.
H. H. Jazi and A. A. Ghorbani, "Dynamic graph-based malware classifier," 2016. 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 112-120, 2016.
M. S. I. Mamun, M. A. Rathore, A. H. Lashkari, N. Stakhanova, and A. A. Ghorbani, "Detecting Malicious URLs Using Lexical Analysis". 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, pp. 467-482, 2016.
R. Killam, N. Stakhanova, and P. Cook, "Android malware classification through linguistic analysis of string literals." First Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS 2016), Portorož, Slovenia, 2016.
G. D. Gil, A. H. Lashkari, M. Mamun, and A. A. Ghorbani, "Characterization of Encrypted and VPN Traffic Using Time-Related Features," Proceedings of the Second International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy, pp. 407-414, 2016.
A. A. Kadir, N. Stakhanova, and A. A. Ghorbani, "Android Botnets: What urls are Telling Us," International Conference on Network and System Security (NSS), New York, NY, pp. 78-91, 2015.
A. J. Alzahrani and A. A. Ghorbani, "Real-time signature-based detection approach for SMS botnet," 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, pp. 157-164, 2015.
M. A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters," 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, pp. 516-521, 2015.
A. Jain, H. Gonzalez, and N. Stakhanova, "Enriching reverse engineering through visual exploration of Android binaries," 5th Program Protection and Reverse Engineering Workshop, Los Angeles, CA, pp. 1-9, Dec. 2015.
H. Gonzalez, A. A. Kadir, N. Stakhanova, A. J. Alzahrani, A. A. Ghorbani, "Exploring reverse engineering symptoms in Android apps," EuroSys '15: Tenth EuroSys Conference, Bordeaux, France, pp. 1-7, Apr. 2015.
H. Gonzalez, M. A. Gosselin-Lavigne, N. Stakhanova, and A. A. Ghorbani, "The Impact of Application-Layer Denial-of-Service Attacks," Case Studies in Secure Computing: Achievements and Trends, Auerbach Publications, 2014.
A. J. Alzahrani and A. A. Ghorbani, "A multi-agent system for smartphone intrusion detection framework,"18th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES 2014), Singapore, pp. 101-113, Nov. 2014.
E. Biglar Beigi, H. Hadian Jazi, N. Stakhanova, and A. A. Ghorbani, "Towards effective feature selection in machine learning-based botnet detection approaches," 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 247-255, Oct. 2014.
H. F. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "DroidKin: Lightweight Detection of Android Apps Similarity," International Conference on Security and Privacy in Communication Networks (SecureComm 2014), Beijing, China, Sep. 2014.
A. J. Alzahrani and A. A. Ghorbani, "SMS mobile botnet detection using a multi-agent system: research in progress," ACySe '14: Agents and CyberSecurity, Paris, France, pp. 1-8, May 2014.
S. Nari and A. A. Ghorbani, "Automated malware classification based on network behavior," 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, pp. 642-647, Jan. 2013.
M. S. Gadelrab and A. Ghorbani, "A New Framework for Publishing and Sharing Network and Security Datasets," 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, Salt Lake City, UT, pp. 539-546, Nov. 2012.
D. Zhao, I. Traoré, A. A. Ghorbani, B. Sayed, S. Saad, and W. Lu, "Peer to Peer Botnet Detection Based on Flow Intervals," 27th IFIP TC 11 Information Security and Privacy Conference SEC 2012, Heraklion, Crete, pp. 87-102, June 2012.
N. Stakhanova, M. Couture, and A. A. Ghorbani, "Exploring network-based malware classification," 2011, sixth International Conference on Malicious and Unwanted Software, Fajardo, PR, pp. 14-20, Oct. 2011.
J. F. C. Joseph and A. A. Ghorbani, "VisVerND: Visual Verification of Network Traffic Dataset," 2011, Ninth Annual Communication Networks and Services Research Conference, Ottawa, ON, pp. 56-62, May 2011.
J. Rrushi, E. Mokhtari, and A. A. Ghorbani, "A statistical approach to botnet virulence estimation," ASIA CCS '11: sixth ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, pp. 508-512, Mar. 2011.
H. Shiravi, A. Shiravi, and A. Ghorbani, "IDS Alert Visualization and Monitoring through Heuristic Host Selection," 12th International Conference on Information and Communications Security (ICICS), Barcelona, Spain, pp. 445-458, Dec. 2010.
N. Stakhanova, H. Ren, and A. A. Ghorbani, "Selective Regular Expression Matching," 13th International Conference on Information Security (ISC‘10), Boca Raton, FL, pp. 226-240, Oct. 2010.
H. Ren, N. Stakhanova, and A. A. Ghorbani, "An Online Adaptive Approach to Alert Correlation," Seventh Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2010), Bonn, Germany, pp. 153-172, Jul. 2010.
A. A. Ghorbani and I-V. Onut, "Y-Means: An Autonomous Clustering Algorithm," fifth International Conference on Hybrid Artificial Intelligent Systems -HAIS, San Sebastián, Spain, pp. 1-13, Jun. 2010.
M. Tavallaee, W. Lu, E. Bagheri, and A. A. Ghorbani, "Automatic Discovery of Network Applications: A Hybrid Approach," 23rd Canadian Conference on Advances in Artificial Intelligence, Ottawa, ON, pp. 208-219, May 2010.
N. Stakhanova and A. A. Ghorbani, "Managing intrusion detection rule sets," Third European Workshop on System Security (EUROSEC), Paris, France, pp. 29-35, Apr. 2010.
W. Lu, M. Tavallaee, and A. A. Ghorbani, "Hybrid Traffic Classification Approach Based on Decision Tree," GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1-6, Dec. 2009.
N. Stakhanova, Y. Li, and A. A. Ghorbani, "Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices," 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, St. John's, NL, pp. 29-37, Aug. 2009.
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, pp. 1-6, Jul. 2009.
W. Lu, M. Tavallaee, G. Rammidi, and A. A. Ghorbani, "BotCop: An Online Botnets Traffic Classifier," Seventh Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, NB, pp. 70-77, May 2009.
M. Tavallaee, W. Lu, and A. A. Ghorbani, "Online Classification of Network Flows," Seventh Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, NB, pp. 78-85, May 2009.
W. Lu, M. Tavallaee, and Ali. A. Ghorbani, "Automatic Discovery of Botnet Communities on Large-Scale Communication Networks," 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS, Sydney, Australia, pp. 1-10, Mar. 2009.
W. Lu and A. A. Ghorbani, "Botnets Detection Based on IRC-Community," IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, New Orleans, LA, pp. 1-5, Nov. - Dec. 2008.
W. Lu and A. A. Ghorbani. "Bots Behaviours vs. Human Behaviours on Large-Scale Communication Networks (Extended Abstract)," 11th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2008), Cambridge, MA, pp. 415-416, Sep. 2008.
R. Sadoddin and A. A. Ghorbani, "Real-time Alert Correlation Using Stream Data Mining Techniques," 20th Conference on Innovative Applications of Artificial Intelligence (IAAI'08), Chicago, IL, pp. 1731-1737, Jul. 2008.
W. Lu, M. Tavallaee, and A. A. Ghorbani, "Detecting Network Anomalies Using Different Wavelet Basis Functions," Sixth Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 149-156, May 2008.
M. Tavallaee, W. Lu, S. A. Iqbal, and A. A. Ghorbani, "A Novel Covariance Matrix Based Approach for Detecting Network Anomalies," Sixth Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 75-81, May 2008.
M. Soleimani and A. A. Ghorbani, "Critical Episode Mining in Intrusion Detection Alerts," Sixth Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 157-164, May 2008.
N. Stakhanova, O. Stakhanov, and A. Ghorbani, "A Behavioral Model of Ideologically-motivated “Snowball” Attacks," 2008. Third International Conference on Availability, Reliability and Security, Barcelona, Spain, pp. 88-95, Mar. 2008.
I.-V. Onut and A. A. Ghorbani, "A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks," Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, pp. 203-203, Jan. 2008.
R. Sadoddin and A. A. Ghorbani, "A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection," Fifth International Conference in Machine Learning and Data Mining in Pattern Recognition (MLDM07), Leipzig, Germany, pp. 404-418, Jul. 2007.
M. Nadjarbashi-Noghani and A. A. Ghorbani, "Design and Implementation of a Behavioral Difference Analyzer for Network Intrusion Detection," PST06: International Conference on Privacy, Security and Trust (PST), Markham, ON, pp. 1-5, Oct. 2006.
R. Sadoddin and A. A. Ghorbani, "Alert Correlation Survey: Framework and Techniques," PST06: International Conference on Privacy, Security and Trust (PST), Markham, ON, pp. 6-15, Oct. 2006.
I.-V. Onut and A. A. Ghorbani, "Toward a feature classification scheme for network intrusion detection," 4th Annual Communication Networks and Services Research Conference (CNSR'06), Moncton, NB, pp. 277-284, May 2006.
I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: A network host-centered anomaly visualization technique," International Conference on Information Security (ISC), Singapore, pp. 16-28, Sep. 2005.
I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: Visual identification of scanning and denial of service attacks," International Conference on Information Security (ISC), Singapore, pp. 1741-1744, Sep. 2005.
I.-V. Onut, B. Zhu, and A. A. Ghorbani, "A novel visualization technique for network anomaly detection," Second Annual Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 167-174, Oct. 2004.
O. Samazder, "Virtual Privacy-Preserving IoT Data Analytics Platform with Applications in Smart Metering," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2023.
P. Danso, "Transferability Machine Learning Model for IoT Device Identification and Vulnerability Assessment," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.
M. Yadollahi, "A Query-Efficient Black-box Adversarial Attack on Text Classification Deep Neural Networks," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.
H. Azimy, "Difficulty Adjustment Algorithms for Preventing Proof-of-Work Mining Attacks," PhD thesis, Faculty of Computer Science, UNB, Fredericton, 2022.
M. Abrishami, "An Effective Approach to Detect Label Noise," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.
H. I. Yekta, "An Efficient Privacy-Preserving Federated Learning Scheme," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.
B. Arbab, "Waffle: A Whitebox AFL-based Fuzzer for discovering Exhaustive Executions," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2021.
M. Safi, "Distributive Continuous Profiling for IoT Devices," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2021.
M. S. Shuvo, "Membership Inference Attacks on Machine Learning Models: Analysis and Mitigation," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2021.
M. Erfani, "Achieving more effective fraud detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2021.
H. Mahdikhani, "Achieving Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2021.
S. Mahdavifar, "Explainable Deep Learning for Detecting Cyber Threats," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.
S. S. Hasanabadi, "Game-theoretic defensive approaches for forensic investigators against anti-forensics," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.
N. Mahmoudyar, "Graph-Based IoT Malware Family Classification," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.
K. K. B. Larbi, "Achieving continuous privacy-preserving histogram query in smart grid communications," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2020.
M. MontazeriShatoori, “An anomaly detection framework for DNS-over-HTTPS (DoH) tunnel using time-series analysis,” Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2020.
M. K. Foumani, "On the evaluation of adversarial vulnerabilities of deep neural networks," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2020.
S. Upadhyay, "Domain generation algorithm (DGA) detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2020.
A. J. Sobeck, "Issues in the implementation of multiplication and factoring algorithms in Galois fields," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2020.
L. Taheri, "Investigating suspected background processes in Android malware classification through dynamic automated reverse engineering and semi-automated debugging," Master thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2020.
G. A. Zendehdel, "A semi-automated security assessment framework for wearable health monitoring devices," Master thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2020.
N. Maleki, "A behavioral based detection approach for business email compromises," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.
M. R. Fatemi, "Threat-hunting in Windows environment using host-based log data," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.
J. O. Josiah, "Authentication in a body area network (BAN) using OpenSSL," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.
A. Matyukhina, "Feasibility of deception in code attribution," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2019.
A. F. Abdul Kadir, "A detection framework for android financial malware," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2018.
N. I. Yekta, "Communication-efficient privacy-preserving query for fog-enhanced Internet of Things," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2018.
J. Iqbal, "Detection and prevention of changes in the DOM tree," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2018.
X. Zhang, “A deep learning-based framework for detecting and visualizing online malicious advertisement,” Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2018.
Y. Ning, "Fingerprinting Android obfuscation tools using visualization," Master thesis, Faculty of Computer Science, UNB, Fredericton, Nov. 2017.
A. Ghraib, "DNA-Droid: a real-time Android ransomware detection framework," Master thesis, Faculty of Computer Science, UNB, Fredericton, Nov. 2017.
V. Kalgutkar, "Android authorship attribution through string analysis," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2017.
H. F. G. Robledo, "An automatic authorship attribution technique for Android applications," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2017.
K. F. Mbah, "A Phishing e-mail detection approach using machine learning techniques," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2017.
A. Alzahrani, "SMS Mobile Botnet Detection Framework," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.
H. H. Jazi, "Dynamic Graph-Based Malware Classifier," Master thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.
A. J. Alzahrani, "An SMS-based mobile botnet detection framework using intelligent agents," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.
Y. Li, "METADroid: lightweight Android classification using meta-data," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2016.
H. Minaee, "A sarcasm detection framework in Twitter and blog posts based on varied range of features sets," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2016.
A. Pourafshar, "A genetic-algorithm-based solution for HTTP-based malware signature generation," Master thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2014.
S. Gu, "Peer to peer botnet detection based on node traffic behavior," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2013.
M. Tavallaee, "An Adaptive Hybrid Intrusion Detection System," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2011.
S. A. Iqbal, "Automatic Rule Tuning in Intrusion Detection Systems: Online and Offline," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2009.
M. Soleimani, "Multi-layer Episode Filtering for the Multi-step Attack Detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2008.
I.-V. Onut, "A Fuzzy Feature Evaluation Framework for Network Intrusion Detection," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2008.
M. Nadjarbashi, "Differential Intrusion Detection Architecture and Analysis," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Jul. 2007.
R. Sadoddin, "An Incremental Frequent Structure Mining Framework for Real-time Alert Correlation," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jul. 2007.
H. Nayyar, "Multi-scale Time Series Prediction for Intrusion Detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2006.
M. Shajari, "Enhancing Network Survivability Using Intelligent Agents," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2005.
B. Zhu, "Alert correlation for extracting attack strategies," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jun. 2005.
H. Azimy, A. Ghorbani, and E. Bagheri, “A new difficulty adjustment algorithm for preventing selfish mining attack,” Canadian Institute for Cybersecurity, Tech.Rep. CIC TR2021-04, July 2021, [available upon request].
Ghorbani, A. H. Lashkari, G. D. Gill, and M. S. I. Mamun, “Systems and Methods for Cybersecurity Risk Assessment of Users of a Computer Network,” US Patent No. 20200244693 A1, submitted 2018, published Jul. 2020.
Ghorbani, I-V. Onut, N. Stakhanova, and W. Bird, “System and method for simulating network attacks,” US Patent No. 8160855, Apr. 2012. Assigned to IBM.
N. Stakhanova, A. Ghorbani, and W. Bird. “Graph structures for event matching,” US Patent No. 9413598B2, Aug. 2009.