Arash Habibi Lashkari

Orcid: 0000-0002-1240-6433

According to our database1, Arash Habibi Lashkari authored at least 69 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction.
Comput. Secur., 2025

2024
Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization.
Inf., April, 2024

Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition.
Int. J. Inf. Sec., April, 2024

A survey on run-time packers and mitigation techniques.
Int. J. Inf. Sec., April, 2024

Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey.
Inf., March, 2024

Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
Inf., February, 2024

Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning.
Peer Peer Netw. Appl., January, 2024

Unveiling malicious DNS behavior profiling and generating benchmark dataset through application layer traffic analysis.
Comput. Electr. Eng., 2024

2023
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
Peer Peer Netw. Appl., May, 2023

A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems.
Appl. Soft Comput., April, 2023

A SEM-STELLA approach for predicting decision-makers' adoption of cloud computing data center.
Educ. Inf. Technol., 2023

IoT Malware Analysis Using Federated Learning: A Comprehensive Survey.
IEEE Access, 2023

Evaluating Label Flipping Attack in Deep Learning-Based NIDS.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023

2022
A Trust-Influenced Smart Grid: A Survey and a Proposal.
J. Sens. Actuator Networks, 2022

Robust stacking ensemble model for darknet traffic classification under adversarial settings.
Comput. Secur., 2022

The sound of intrusion: A novel network intrusion detection system.
Comput. Electr. Eng., 2022

QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution.
IEEE Access, 2022

Evaluating Deep Learning-based NIDS in Adversarial Settings.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

PDF Malware Detection based on Stacking Learning.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Detecting Obfuscated Malware using Memory Feature Engineering.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Federated Learning Assisted IoT Malware Detection Using Static Analysis.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
KeyShield: A Scalable and Quantum-Safe Key Management Scheme.
IEEE Open J. Commun. Soc., 2021

A memory-based game-theoretic defensive approach for digital forensic investigators.
Digit. Investig., 2021

Classifying and clustering malicious advertisement uniform resource locators using deep learning.
Comput. Intell., 2021

Towards Query-efficient Black-box Adversarial Attack on Text Classification Models.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

A Novel Trust Model In Detecting Final-Phase Attacks in Substations.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

RiskISM: A Risk Assessment Tool for Substations.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

Behavioural Monitoring and Security Profiling in the Internet of Things (IoT).
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Classifying Malicious Domains using DNS Traffic Analysis.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour.
Digit. Investig., 2020

A game-theoretic defensive approach for forensic investigators against rootkits.
Digit. Investig., 2020

DIDroid: Android Malware Classification and Characterization Using Deep Image Learning.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Intrusion Traffic Detection and Characterization using Deep Image Learning.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
A Survey on User Profiling Model forAnomaly Detection in Cyberspace.
J. Cyber Secur. Mobil., 2019

An evaluation framework for network security visualizations.
Comput. Secur., 2019

Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

Securing GOOSE: The Return of One-Time Pads.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019

2018
A Detailed Analysis of the CICIDS2017 Data Set.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018

2017
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017

A Lightweight Online Advertising Classification System using Lexical-based Features.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Characterization of Tor Traffic using Time based Features.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

BotViz: A memory forensic-based botnet detection and visualization approach.
Proceedings of the International Carnahan Conference on Security Technology, 2017

CIC-AB: Online ad blocker for browsers.
Proceedings of the International Carnahan Conference on Security Technology, 2017

A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Innovations in Communications Security.
J. Electr. Comput. Eng., 2016

Detecting Malicious URLs Using Lexical Analysis.
Proceedings of the Network and System Security - 10th International Conference, 2016

Characterization of Encrypted and VPN Traffic using Time-related Features.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Cloud Computing Data Center Adoption Factors Validity By Fuzzy AHP.
Int. J. Comput. Intell. Syst., 2015

2012
Android mobile augmented reality application based on different learning theories for primary school children.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
A Survey on Web-based AR Applications
CoRR, 2011

Users' perceptions on mobile devices security awareness in Malaysia.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Security Evaluation for Graphical Password.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

A Wide Survey on Botnet.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

A Secure Recognition Based Graphical Password by Watermarking.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns
CoRR, 2010

2009
Shoulder Surfing attack in graphical password authentication
CoRR, 2009


  Loading...