Arash Habibi Lashkari
Orcid: 0000-0002-1240-6433
According to our database1,
Arash Habibi Lashkari
authored at least 69 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction.
Comput. Secur., 2025
2024
Toward Generating a New Cloud-Based Distributed Denial of Service (DDoS) Dataset and Cloud Intrusion Traffic Characterization.
Inf., April, 2024
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition.
Int. J. Inf. Sec., April, 2024
Int. J. Inf. Sec., April, 2024
Authorship Attribution Methods, Challenges, and Future Research Directions: A Comprehensive Survey.
Inf., March, 2024
Identifying Malware Packers through Multilayer Feature Engineering in Static Analysis.
Inf., February, 2024
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning.
Peer Peer Netw. Appl., January, 2024
Unveiling malicious DNS behavior profiling and generating benchmark dataset through application layer traffic analysis.
Comput. Electr. Eng., 2024
2023
Peer Peer Netw. Appl., May, 2023
A gradient-based approach for adversarial attack on deep learning-based network intrusion detection systems.
Appl. Soft Comput., April, 2023
A SEM-STELLA approach for predicting decision-makers' adoption of cloud computing data center.
Educ. Inf. Technol., 2023
IEEE Access, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2023
2022
J. Sens. Actuator Networks, 2022
Robust stacking ensemble model for darknet traffic classification under adversarial settings.
Comput. Secur., 2022
Comput. Electr. Eng., 2022
QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution.
IEEE Access, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework.
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
2021
IEEE Open J. Commun. Soc., 2021
Digit. Investig., 2021
Classifying and clustering malicious advertisement uniform resource locators using deep learning.
Comput. Intell., 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021
Lightweight Hybrid Detection of Data Exfiltration using DNS based on Machine Learning.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour.
Digit. Investig., 2020
Digit. Investig., 2020
DIDroid: Android Malware Classification and Characterization Using Deep Image Learning.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
2019
J. Cyber Secur. Mobil., 2019
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy.
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019
Proceedings of the 2019 International Carnahan Conference on Security Technology, 2019
2018
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals.
Proceedings of the 2018 International Carnahan Conference on Security Technology, 2018
2017
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Towards a Network-Based Framework for Android Malware Detection and Characterization.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Proceedings of the 7th International Conference on Communication and Network Security, 2017
2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Int. J. Comput. Intell. Syst., 2015
2012
Android mobile augmented reality application based on different learning theories for primary school children.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012
2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
A Wide range Survey on Recall Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns
CoRR, 2010
2009