Publications | Research | Canadian Institute for Cybersecurity | UNB

Global Site Navigation (use tab and down arrow)

Canadian Institute for Cybersecurity

Publications

Books

G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, "Understanding Cybersecurity Risk in FMI using HPC,” in Cybersecurity & High-Performance Computing Environments, Taylor & Francis, 2022.

C. L. Chowdhary, M. Alazab, A. Chaudhary, S. Hakak, & T. R. Gadekallu, Eds, Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches: Fundamentals, technologies and applications: Institution of Engineering and Technology, 2021.

G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, Understanding Cybersecurity Management in FinTech:  Challenges, Strategies, and Trends, Switzerland:  Springer International Publishing, 2021.

G. Kaur and A. Habibi Lashkari, "Information Technology Risk Management,” in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds.  Cham:  Springer, 2021.

G. Kaur and A. Habibi Lashkari, "An Introduction to Security Operations," in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds.  Cham:  Springer, 2021.

X. Zhang and A. A. Ghorbani, "Human Factors in Cybersecurity: Issues and Challenges in Big Data," in Security, Privacy, and Forensics Issues in Big Data, IGI Global, 2020, pp 66-96.


N. Stakhanova, and A. A. Cardenas, "Analysis of Metrics for Classification Accuracy in Intrusion Detection," in Empirical Research for Software Security: Foundations and Experience, L. Othmane, M. G. Jaatun, and E. Weippl, Eds.  Boca Raton:  CRC Press, 2018.

A. A. Kadir, N. Stakhanova, and A. A. Ghorbani, "An empirical analysis of Android banking malware," in Protecting Mobile Networks and Devices: Challenges and Solutions, W. Meng, X. Luo, J. Zhou, and S. Furnell, Eds.  New York:  Auerbach Publications, 2017.

H. Gonzalez, M.-A. Gosselin-Lavigne, N. Stakhanova, and A. A. Ghorbani, "The impact of application layer denial of service attacks," in Case Studies in Secure Computing - Achievements and Trends, B. Issac and N. Israr, Eds.  New York:  Auerbach Publications, 2015.

P. Kabiri and A. A. Ghorbani, "Dimension reduction and its effects on Clustering for Intrusion Detection," in Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, P. Kabiri, Ed.  IGI Global, 2011.

A. A. Ghorbani, W. Lu, and M. Tavallaee, "Network Intrusion Detection and Prevention - Concepts and Techniques, Springer Series," in Advances in Information Security Series, Vol.47.  New York:  Springer-Verlag US, 2010.


Journals

These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

M. Y. Aldarwbi, A. H. Lashkari, and A. A. Ghorbani. "The sound of intrusion: A novel network intrusion detection system," Computers and Electrical Engineering, vol. 104, part A, 108455, 2022.

K. Boakye-Boateng, A. A. Ghorbani, and A. H. Lashkari. 2022. "A Trust-Influenced Smart Grid: A Survey and a Proposal," Journal of Sensor and Actuator Networks, 11, no. 3: 34, 2022.

M. D. Firoozjaei, N. Mahmoudyar, Y. Baseri, and Ali A Ghorbani. "An evaluation framework for industrial control system cyber incidents," International Journal of Critical Infrastructure Protection, vol. 36, 100487, 2022.

S. Mahdavifar, F. Deldar, and H Mahdikhani. "Personalized Privacy-Preserving Publication of Trajectory Data by Generalization and Distortion of Moving Points," Journal of Network and Systems Management, vol. 30, no. 1, pp. 1-42, 2022.

W. Shahid, Y. Li, D. Staples, G. Amin, S. Hakak and A. Ghorbani, "Are You a Cyborg, Bot or Human? -A Survey on detecting fake news spreaders," in IEEE Access, early access, Mar. 2022.


X. Zhang, R. Lu, J. Shao, and A. A. Ghorbani. “Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing,” IEEE Internet of Things Journal, vol. 16, no. 8, 2021.

M. M. Yadollahi, A. H. Lashkari, and A. A. Ghorbani, "Towards Query-efficient Black-box Adversarial Attack on Text Classification Models," 2021 18th International Conference on Privacy, Security and Trust, pp. 1-7, 2021.

M. Y. Aldarwbi, A. A. Ghorbani, and A. H. Lashkari, "KeyShield: A scalable and quantum-safe key management scheme," IEEE Open Journal of the Communications Society, vol. 2, pp. 87-101, 2021.

K. Boakye-Boateng, A. A. Ghorbani, and A. Lashkari, "A Novel Trust Model In Detecting Final-Phase Attacks in Substations," 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 1-11, Dec. 2021

C. Beaman, A. Barkworth, T. D. Akande, S. Hakak, and M. K. Khan, “Ransomware: Recent Advances, Analysis, Challenges and Future Research Directions,” Computers & Security, vol. 11, Dec. 2021.

D. P. Sharma, B. Kaur, F. Shoeleh, M. Erfani, DP. Le, A. H. Lashkari, and A. A. Ghorbani, "Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management,"  15th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2021 ), Athens, Greece, pp. 82-87, Nov. 2021.

M. M. Yadollahi, F. Shoeleh, S. Dadkhah, and A. A. Ghorbani. "Robust Black-box Watermarking for Deep Neural Network using Inverse Document Frequency," 6th IEEE Cyber Science and Technology Congress, Oct. 2021.

S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A memory-based game-theoretic defensive approach for digital forensic investigators," Forensic Science International: Digital Investigation, vol. 38, Sep. 2021.

M. A. Jarwar, S. A. Khowaja, K. Dev, M. Adhikari, and S. Hakak, "NEAT: A Resilient Deep Representational Learning for Fault Detection using Acoustic Signals in IIoT Environment," IEEE Internet of Things Journal, Early Access, Sep. 2021.

P. K. Reddy Maddikunta, S. Hakak, M. Alazab, S. Bhattacharya, T. R. Gadekallu, W. Z. Khan, and Q. -V. Pham, "Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges," IEEE Sensors Journal, vol. 21, no. 16, pp. 17608-17619, Aug. 2021.

H. Ghayvat, S. N. Pandya, P. Bhattacharya, M. Zuhair, M. Rashid, S. Hakak, S., and K. Dev, "CP-BDHCA: Blockchain-based Confidentiality-Privacy preserving Big Data scheme for healthcare clouds and applications," IEEE Journal of Biomedical and Health Informatics, Early Access, Jul. 2021.

W. Khan, S. Hakak, and M. K. Khan, “Trust Management in Social Internet of Things: Architectures, Recent Advancements, and Future Challenges, IEEE Internet of Things, vol. 8, no. 10, May 2021.

S. Hakak, M. Alazab, S. Khan, T. R. Gadekallu, P. K. R. Maddikunta, and W. Z. Khan, “An ensemble machine learning approach through effective feature extraction to classify fake news,” Future Generation Computer Systems, vol. 117, pp. 47-58, Apr. 2021.

H. Mahdikhani, R. Lu, J. Shao, and A. Ghorbani, “Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4762-4774, Mar. 2021.

X. Zhang, A. H. Lashkari, and A. A. Ghorbani, "Classifying and clustering malicious advertisement uniform resource locators using deep learning," Computational Intelligence, vol. 37, no. 1, pp. 511-537, Feb. 2021. 


S. Mahdavifar and A. A. Ghorbani, "DeNNeS: Deep Embedded Neural Network Expert System for Detecting Cyber Attacks," Neural Computing and Applications, vol. 32, pp. 14753–14780, 2020.

S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents’ behaviour,” Forensic Science International: Digital Investigation, vol. 35, pp. 301024, 2020.

P. A. Bonatti, L. Ioffredo, I. M. Petrova, L. Sauro, and I. R. Siahaan, "Real-time reasoning in OWL2 for GDPR compliance," Artificial Intelligence, vol. 289, art. 103389, Dec. 2020.

X. Zhang, R. Lu, J. Shao, and A. A. Ghorbani, "Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS," IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11524-11535, Dec. 2020.

S. L. Yeo, D-P. Le, and K. Khoo, “Improved Algebraic Attacks on Lightweight Block Ciphers,” Journal of Cryptographic Engineering, Nov. 2020.

D-P. Le and A. A. Ghorbani, “Memory-Efficient Random Order Exponentiation Algorithm,” IEEE Access, vol. 8, pp. 146923--146931, Aug. 2020.

H. Mahdikhani, R. Lu, Y. Zheng, J. Shao, and A. Ghorbani, “Achieving O(log^3⁡n) Communication-Efficient Privacy-Preserving Range Query in Fog-based IoT,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5220-5232, Jun. 2020.

Hakak, W. Z. Khan, M. Imran, K. -K. R. Choo and M. Shoaib, “Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies,” IEEE Access, vol. 8, pp. 124134-124144, Jun. 2020.

X. Zhang and A. A. Ghorbani,  "An overview of online fake news: Characterization, detection, and discussion," Information Processing & Management, vol. 57, no. 2, pp. 102025, Mar. 2020.

S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "A game-theoretic defensive approach for forensic investigators against rootkits," Forensic Science International: Digital Investigation, vol. 32, Mar. 2020.

H. Mahdikhani, R. Shahsavarifar, R. Lu, and D. Bremner, “Achieve Privacy-Preserving Simplicial Depth Query over Collaborative Cloud Servers,” Peer-to-Peer Networking and Applications, vol. 13, no. 1, pp. 412-423, Jan. 2020.


H. Mahdikhani, S. Mahdavifar, R. Lu, H. Zhu, and A. A. Ghorbani, “Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT,” IEEE Access, vol. 7, pp. 184438-184447, 2019.

B. Li, R. Lu, G. Xiao, H. Bao, and A. A. Ghorbani, "Towards insider threats detection in smart grid communication systems," IET Communications, vol. 13(12), pp. 1728-1736, 2019.

S. Mahdavifar and A. A. Ghorbani, "Application of deep learning to cybersecurity: A survey," Neurocomputing, vol. 347, pp. 149-176, 2019.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "An evaluation framework for network security visualizations," Computers & Security, vol. 84, pp. 70-92, Mar. 2019.


W. Guo, J. Shao, R. Lu, Y. Liu, and A. A. Ghorbani, "A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment," IEEE Access, vol. 6, pp. 48946-48957, 2018.

A. H. Lashkari, M. Chen, and A. A. Ghorbani, "A Survey on User Profiling Models for Anomaly Detection in Cyberspace," Journal of Cyber Security and Mobility, vol. 2, 2018.

C. Zhang, L. Zhu, C. Xu, and R. Lu, "PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system," Future Generation Computer Systems, vol. 79, pp. 16-25, 2018.

I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "Towards a Reliable Intrusion Detection Benchmark Dataset," Software Networking Journal, vol. 2017, iss. 1, pp. 177-200, Jan. 2018.


C. Xu, R. Lu, H. Wang, L. Zhu, and C. Huang, "TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning," IEEE Access, vol. 5, pp. 26973 - 26989, 2017.

K. F. Mbah, A. H. Lashkari, and A. A. Ghorbani, "A Phishing Email Detection Approach Using Machine Learning Techniques," World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, vol. 4, no. 1, 2017.

O. Osanaiye, S. Chen, Z. Yan, R. Lu, R. Choo, and M. Dlodlo, "From Cloud to Fog Computing: A Review and A Conceptual Live VM Migration Framework," IEEE Access, vol. 5, pp. 8284-8300, 2017.

R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017.

C. Huang, R. Lu, and R. Choo, "Secure and flexible cloud-assisted association tule mining over horizontally partitioned databases," Journal of Computer and System Sciences, vol. 89, pp. 51-63, Nov. 2017.

C. Huang, R. Lu, and K. K. Choo, "Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges," IEEE Communications Magazine, vol. 55, no. 11, pp. 105-111, Nov. 2017.

H. H. Jazi, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Detecting HTTP-based Application Layer DoS attacks on Web Servers in the presence of sampling," Computer Networks, vol. 121, pp. 25-36, Jul. 2017.

C. Huang, R. Lu, and H. Zhu. "Privacy-Friendly Spatial Crowdsourcing in Vehicular Networks," Journal of Communications and Information Networks, vol. 2, no. 2, pp. 59-74, Jun. 2017.


G. Mantas, N. Stakhanova, H. Gonzalez, H. H. Jazi, and A. A. Ghorbani, "Application-layer denial of service attacks: taxonomy and survey," International Journal of Information and Computer Security, vol. 7, no. 2/3/4, pp. 216-239, Nov. 2015.

A. J. Alzahrani, N. Stakhanova, H. Gonzalez, and A. A. Ghorbani, "Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones," Journal of Cyber Security and Mobility, vol. 3, iss. 2, pp. 89-132, Apr. 2014.

J. L. Rrushi and A. Ghorbani, "A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management," Journal of Computer Virology and Hacking Techniques, vol. 10, pp. 29-51, 2013.

D. Zhao, I. Traore, B. Sayed, W. Lu, S. Saad, A. Ghorbani, and D. Garant, "Botnet Detection based on Traffic Behaviour Analysis and Flow Intervals," Computer & Security, vol. 39, pt. A, pp. 2-16, Nov. 2013.

M. Bateni, A. Baraani, and A. Ghorbani, "Using Artificial Immune System and Fuzzy Logic for Alert Correlation," International Journal of Network Security, vol. 15, no. 3, pp. 190-204, May 2013.

M. Bateni, A. Baraani, A. Ghorbani, and A. Rezaei, "An AIS-inspired Architecture for Alert Correlation," International Journal of Innovative Computing, Information and Control, vol. 9, no. 1, pp. 231-255, Jan. 2013.

H. Shiravi, A. Shiravi, and A. A. Ghorbani, "A Survey of Visualization Systems for Network Security," IEEE Transactions on Visualization and Computer Graphics, vol. 18, no. 8, pp. 1313-1329, Aug. 2012.

M. Bateni, A. Baraani, and A. Ghorbani, "Alert Correlation using Artificial Immune Recognition System," International Journal of Bio-Inspired Computation, vol. 4, iss. 3, pp. 181-195, Jun. 2012.

M. Soleimani and A. A. Ghorbani, "Multi-layer episode filtering for the multi-step attack detection," Computer Communications, vol. 35, iss. 11, pp. 1368-1379, Jun. 2012.

M. Bateni, A. Baraani, A. Ghorbani, and A. Rezaei, "Alert Correlation using Artificial Immune Recognition System," International Journal of Bio-Inspired Computation, vol. 4, iss. 3, pp.181-195, Jun. 2012.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward developing a systematic approach to generate benchmark datasets for intrusion detection," Computers & Security, vol. 31, iss. 3, pp. 357-374, May 2012.J. Lei and A. A. Ghorbani, "Improved Competitive Learning Neural Networks for Network Intrusion and Fraud Detection," Neurocomputing, vol. 75, iss. 1, pp. 135-145, Jan. 2012.

J. Rrushi, E. Mokhtari, and A. A. Ghorbani, "Estimating Botnet Virulence within Mathematical Models of Botnet Propagation Dynamics," Computers & Security, vol. 30, iss. 8, pp. 791-802, Nov. 2011.

W. Lu, G. Rammidi, and A. A. Ghorbani, "Clustering Botnet Communication Traffic Based on N-gram Feature Selection," Computer Communications, vol. 34, no. 3, pp. 502-514, Mar. 2011.

W. Lu, G. Rammidi, and A. A. Ghorbani. "Clustering Botnet Communication Traffic Based on N-gram Feature Selection," Computer Communications, vol 34, iss. 3, pp. 502-514, Mar. 2011.


L. Wang, A. A. Ghorbani, and Y. Li, "Automatic Discovery of Multistep Attack Patterns," International Journal of Network Security, vol. 10, no. 2, pp. 142-152, 2010.

Y. Lin, M. D. McCool, and A. A. Ghorbani, "Time Series Motif Discovery and Anomaly Detection Based on Subseries Join," IAENG International Journal of Computer Science, vol. 34, no. 3, pp. 502-514, 2010.

M. Tavallaee, N. Stakhanova, and A. A. Ghorbani, "Toward Credible Evaluation of Anomaly-based Intrusion Detection Methods," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 40, no. 5, pp. 516-524, Sep. 2010.

R. Sadoddin and A. A. Ghorbani, "An Incremental Frequent Structure Mining Framework for Real-time Alert Correlation," Computers & Security, vol. 28, iss 3-4, pp. 153-173, May-Jun. 2009.

W. Lu and A. A. Ghorbani. "Network Anomaly Detection Based on Wavelet Analysis," EURASIP Journal on Advances in Signal Process, no. 837601, Jun. 2008.

H. Nayyar and A. A. Ghorbani. "Approximate Autoregressive Modeling for Network Attack Detection," Journal of Computer Security, vol. 16, no. 2, pp.165-197, Apr. 2008.

I.-V. Onut and A. A. Ghorbani, "A Feature Classification Scheme For Network Intrusion Detection," International Journal of Network Security, vol. 5, no. 1, pp. 1-15, Jul. 2007.

I.-V. Onut and A. A. Ghorbani, "SVision: A novel Visual Network-anomaly identification technique," Computers & Security, vol. 26, no. 3, pp. 201-212, May 2007.

B. Zhu and A. A. Ghorbani, "Alert Correlation for Extracting Attack Strategies," International Journal of Network Security, vol. 3, no. 3, pp. 244-258, Nov. 2006.

M. Nadjarbashi-Noghani and A. A. Ghorbani, "A Taxonomy of Attacks with Applications to Diversity Based Intrusion Detection," Journal of Information Assurance and Security, vol. 1. iss. 3, pp. 217-232, Sep. 2006.

P. Kabiri and A. A. Ghorbani, "Research on Intrusion Detection and Response: A Survey," International Journal of Network Security, vol. 1, no. 2, pp. 84-102, Sep. 2005.


Conferences

These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

D. Keyes, B. Li, G. Kaur, A. Lashkari, "Entroplyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics," Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.

A. Lashkari, B. Li, T. Carrier, and G. Kaur, “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering,” Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.

K. Boakye-Boateng, I. S. R. Siahaan, A. H. Al Muktadir, D. Xu and A. A. Ghorbani, "Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection," 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Espoo, Finland, Oct. 2021.

K. Boakye-Boateng. A. A. Ghorbani, and A. H. Lashkari, "RiskISM: A Risk Assessment Tool for Substations," 2021 IEEE 9th International Conference on Smart City and Informatization (iSCI) 2021, Shenyang, China, Oct. 2021.

N. Mashtalyar, T. Santos, U. N. Ntaganzwa, S. Hakak, and S. Ray, "Social Engineering Attacks: Recent Advances and Challenges," 23rd International Conference on Human-Computer Interaction, Washington, DC, Jul. 2021.

A. H. Al Muktadir, I. S. R. Siahaan, K. Boakye-Boateng, D. Xu, and A. A. Ghorbani, "Recommending Location for Placing Data Collector in the OPC Classic," 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Victoria, BC, May 2021.

 


Y. Fei, G. Gong, C. Gongye, K. Mandal, R. Rohit, T. Xu, Y. Yi, and N. Zidaric, “Correlation Power Analysis and Higher-order Masking Implementation of WAGE,” Selected Areas in Cryptography (SAC) 2020, Halifax, NS, 2020.

K. Mandal and G. Gong, “Can LWC and PEC be Friends?: Evaluating Lightweight Ciphers in Privacy-enhancing Cryptography,” NIST Lightweight Cryptography Workshop 2020, Gaithersburg, MD, 2020.

F. Shoeleh, M. Erfani, D.-P. Le, and A. A. Ghorbani, "Ensemble of Hierarchical Temporal Memory for Anomaly Detection," 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), Sydney, Australia, pp. 50-59, 2020.

S. Hakak, S. Ray, W. Z. Khan, and E. Scheme, “A Framework for Edge-Assisted Healthcare Data Analytics using Federated Learning IEEE International Conference on Big Data (IEEE BigData 2020) - International Workshop on DASH 2020: Data Analytics for Smart Health, Atlanta, GA, Dec. 2020.

S. HakakWZKhan, S. Bhattacharya, G. T. Reddy, and K.-K. R. Choo Propagation of Fake News Using Social Media: Mitigation and Research Challenges”, 9th International Conference on Computational Data and Social Networks, Dallas, TXpp. 345-353, Dec. 2020.

G. Kaur, A. H. Lashkari, A. Rahali, L. Taheri, and F. Gagnon,  "DIDroid: Android Malware Classification and Characterization Using Deep Image Learning," 2020 the 10th International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.

A. H. Lashkari, G. Kaur, and A. Rahali, “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Encrypted Traffic using Deep Image Learning,” 2020 the 10th International Conference on Communication and Network Security (ICCNS 2020), Tokyo, Japan, Nov. 2020.

D.-P. Le, "Synthetic Data Generation and Evaluation," 2020 Serene-risc Workshop (Online), Oct. 2020.

S. Mahdavifar, A. F. A. Kadir, R. Fatemi, D. Alhadidi, and A. A. Ghorbani, “Dynamic Android Malware Category Classification Using Semi-Supervised Deep Learning,” IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), Calgary, AB, pp. 515-522, Aug. 2020.

G. Kaur, A. H. Lashkari, and A. Rahali, "Intrusion Traffic Detection and Characterization using Deep Image Learning," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, pp. 55-62, Aug. 2020.

M. MontazeriShatoori, L. Davidson, G. Kaur, and A. H. Lashkari, "Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic," 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, Calgary, AB, pp. 63-70, Aug. 2020.

H. Mahdikhani, R. Lu, Y. Zheng, and A. Ghorbani, "Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter," ICC 2020 - 2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, pp. 1-6, Jun. 2020.


D.-P. Le, G. Yang, and A. A. Ghorbani, "A New Multisignature Scheme with Public Key Aggregation for Blockchain," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-7, 2019.

S. Linoy, H. Mahdikhani, S. Ray, R. Lu, N. Stakhanova, and A. Ghorbani, “Scalable Privacy-Preserving Query Processing Over Ethereum Blockchain,” 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, pp. 398-404, 2019.

X. Zhang, R. Lu, J. Shao, H. Zhu, and A. A. Ghorbani, "Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing," 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi'an, China, pp. 1-6, 2019.

H. Azimy and A. Ghorbani, "Competitive Selfish Mining," 2019 17th International Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 1-8, 2019.

X. Zhang, A. H. Lashkari, N. Maleki, J. F. Mudge, and A. A. Ghorbani, "Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network," 2019 International Conference on Security and Management (SAM'19), Las Vegas, NV, pp. 208-215, Nov. 2019.

I. Sharafaldin, A. H. Lashkari, S. Hakak, and A. A. Ghorbani, “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy,”  2019 International Carnahan Conference on Security Technology Chennai (ICCST), India, pp. 1-8, Oct. 2019.

K. Boakye-Boateng and A. H. Lashkari, "Securing GOOSE: The Return of One-Time Pads," 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, Oct. 2019.


A. H. Lashkari, L. Taheri, A. Fitriah, and A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-7, 2018.

S. S. Hasanabadi, A. H. Lashkari, and A. A. Ghorbani, "The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, PQ, pp. 1-6, 2018.

N. Yekta and R. Lu, "XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.

M. Wen, D. Yao, B. Li, and R. Lu, "State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.

C. Huang, D. Liu, J. Ni, R. Lu, and X. Shen, "Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, pp. 1-6, 2018.

I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," 4th International Conference on Information Systems Security and Privacy (ICISSP)Portugal, pp. 108-116, Jan. 2018.


H. Mahdikhani and R. Lu, "Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.

A. H. Lashkari, A. F. A. Kadir, H. Gonzalez, K. F. Mbah, and A. A. Ghorbani, "Towards a Network-Based Framework for Android Malware Detection and Characterization," 2017 15th Annual Conference on Privacy, Security and Trust (PST), Calgary, AB, pp. 233-23309, 2017.

B. Li, R. Lu, and G. Xiao, "HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.

S. Zhang, H. Li, Y. Dai, M. He, and R. Lu, "EPP-DMM: an Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication," GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.

N. I. Yekta and R. Lu, "PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things," 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.

Q. Kong, M. Ma, and R. Lu, "Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks", 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), Toronto, ON, pp. 1-5, 2017.

A. H. Lashkari, G. D. Gil, J. E. Keenan, K. F. Mbah, and A. A. Ghorbani, "A New Evaluation framework for Network Traffic base Botnet Detection Methods," 7th International Conference on Communication and Network Security (ICCNS 2017), Japan, pp. 59-66, 2017.

A. Gharib and A. Ghorbani, "DNA-Droid: A Real-Time Android Ransomware Detection Framework," International Conference on Network and System Security (NSS 2017), Helsinki, Finland, pp. 184-198, 2017.

A. H. Lashkari, A. Seo, G. D. Gil, and A. Ghorbani, "CIC-AB: Online Ad Blocker for Browsers," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-7, 2017.

I. Sharafaldin, A. Gharib, A. H. Lashkari, and A. A. Ghorbani, "BotViz: A Memory Forensic-Based Botnet Detection and Visualization Approach," 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-8, 2017.

F. Wang, H. Zhu, R. Lu, F. Liu, C. Huang, and H. Li, "Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications," SecureComm 2017: Security and Privacy in Communication Networks, Niagara Falls, pp. 339-355, Oct. 2017.

R. Lu, "How to Achieve Efficient Range Query over Encrypted Data in Cloud", 2nd International Workshop on Mobile Communications and Networking (IWMCN), 2017, Waterloo, ON, Sep. 2017.

X. Zhang, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Online Advertising Classification System Using Lexical-based Features," 14th International Conference on Security and Cryptography (SECRYPT 2017), Madrid, Spain, pp. 486-494, Jul. 2017.

S. Chen, R. Lu, and J. Zhang, "A Flexible Privacy-preserving Framework for Singular Value Decomposition under Internet of Things Environment," 11th IFIP WG 11.11 International Conference on Trust Management, Göteborg, Sweden, Jun. 2017.

A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, "Characterization of Tor Traffic Using Time-Based Features," 3rd International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal, pp. 253-262, Feb. 2017.


A. Gharib, I. Sharafaldin, A. H. Lashkari, and A, A. Ghorbani, "An Evaluation Framework for Intrusion Detection Dataset," 2016 International Conference on Information Science and Security (ICISS), Pattaya, Thailand, pp. 1-6, 2016.

H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "Measuring code reuse in Android apps," 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 187-195, 2016.

H. H. Jazi and A. A. Ghorbani, "Dynamic graph-based malware classifier," 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, pp. 112-120, 2016.

M. S. I. Mamun, M. A. Rathore, A. H. Lashkari, N. Stakhanova, and A. A. Ghorbani, "Detecting Malicious URLs Using Lexical Analysis," 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, pp. 467-482, 2016.

R. Killam, N. Stakhanova, and P. Cook, "Android malware classification through linguistic analysis of string literals," First Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS 2016), Portorož, Slovenia, 2016.

G. D. Gil, A. H. Lashkari, M. Mamun, and A. A. Ghorbani, "Characterization of Encrypted and VPN Traffic Using Time-Related Features," Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy, pp. 407-414, 2016.


A. A. Kadir, N. Stakhanova, and A. A. Ghorbani, "Android Botnets: What urls are Telling Us," International Conference on Network and System Security (NSS), New York, NY, pp. 78-91, 2015.

A. J. Alzahrani and A. A. Ghorbani, "Real-time signature-based detection approach for SMS botnet," 2015 13th Annual Conference on Privacy, Security and Trust (PST), Izmir, Turkey, pp. 157-164, 2015.

M. A. Gosselin-Lavigne, H. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters," 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, pp. 516-521, 2015.

A. Jain, H. Gonzalez, and N. Stakhanova, "Enriching reverse engineering through visual exploration of Android binaries," 5th Program Protection and Reverse Engineering Workshop, Los Angeles, CA, pp. 1-9, Dec. 2015.

H. Gonzalez, A. A. Kadir, N. Stakhanova, A. J. Alzahrani, A. A. Ghorbani, "Exploring reverse engineering symptoms in Android apps," EuroSys '15: Tenth EuroSys Conference, Bordeaux, France, pp. 1-7, Apr. 2015.

H. Gonzalez, M. A. Gosselin-Lavigne, N. Stakhanova, and A. A. Ghorbani, "The Impact of Application-Layer Denial-of-Service Attacks," Case Studies in Secure Computing: Achievements and Trends, Auerbach Publications, 2014.

A. J. Alzahrani and A. A. Ghorbani, "A multi-agent system for smartphone intrusion detection framework," 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES 2014), Singapore, pp. 101-113, Nov. 2014.

E. Biglar Beigi, H. Hadian Jazi, N. Stakhanova, and A. A. Ghorbani, "Towards effective feature selection in machine learning-based botnet detection approaches," 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, pp. 247-255, Oct. 2014.

H. F. Gonzalez, N. Stakhanova, and A. A. Ghorbani, "DroidKin: Lightweight Detection of Android Apps Similarity," International Conference on Security and Privacy in Communication Networks (SecureComm 2014), Beijing, China, Sep. 2014.

A. J. Alzahrani and A. A. Ghorbani, "SMS mobile botnet detection using a multi-agent system: research in progress," ACySe '14: Agents and CyberSecurity, Paris, France, pp. 1-8, May 2014.

S. Nari and A. A. Ghorbani, "Automated malware classification based on network behavior," 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, pp. 642-647, Jan. 2013.

M. S. Gadelrab and A. Ghorbani, "A New Framework for Publishing and Sharing Network and Security Datasets," 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, Salt Lake City, UT, pp. 539-546, Nov. 2012.

D. Zhao, I. Traoré, A. A. Ghorbani, B. Sayed, S. Saad, and W. Lu, "Peer to Peer Botnet Detection Based on Flow Intervals," 27th IFIP TC 11 Information Security and Privacy Conference SEC 2012, Heraklion, Crete, pp. 87-102, June 2012.

N. Stakhanova, M. Couture, and A. A. Ghorbani, "Exploring network-based malware classification," 2011 6th International Conference on Malicious and Unwanted Software, Fajardo, PR, pp. 14-20, Oct. 2011.

J. F. C. Joseph and A. A. Ghorbani, "VisVerND: Visual Verification of Network Traffic Dataset," 2011 Ninth Annual Communication Networks and Services Research Conference, Ottawa, ON, pp. 56-62, May 2011.

J. Rrushi, E. Mokhtari, and A. A. Ghorbani, "A statistical approach to botnet virulence estimation," ASIA CCS '11: 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, pp. 508-512, Mar. 2011.

H. Shiravi, A. Shiravi, and A. Ghorbani, "IDS Alert Visualization and Monitoring through Heuristic Host Selection," 12th International Conference on Information and Communications Security (ICICS), Barcelona, Spain, pp. 445-458, Dec. 2010.

N. Stakhanova, H. Ren, and A. A. Ghorbani, "Selective Regular Expression Matching," 13th International Conference on Information Security (ISC‘10), Boca Raton, FL, pp. 226-240, Oct. 2010.

H. Ren, N. Stakhanova, and A. A. Ghorbani, "An Online Adaptive Approach to Alert Correlation," Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2010), Bonn, Germany, pp. 153-172, Jul. 2010.

A. A. Ghorbani and I-V. Onut, "Y-Means: An Autonomous Clustering Algorithm," 5th International Conference on Hybrid Artificial Intelligent Systems -HAIS, San Sebastián, Spain, pp. 1-13, Jun. 2010.

M. Tavallaee, W. Lu, E. Bagheri, and A. A. Ghorbani, "Automatic Discovery of Network Applications: A Hybrid Approach," 23rd Canadian Conference on Advances in Artificial Intelligence, Ottawa, ON, pp. 208-219, May 2010.

N. Stakhanova and A. A. Ghorbani, "Managing intrusion detection rule sets," Third European Workshop on System Security (EUROSEC), Paris, France, pp. 29-35, Apr. 2010.

W. Lu, M. Tavallaee, and A. A. Ghorbani, "Hybrid Traffic Classification Approach Based on Decision Tree," GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1-6, Dec. 2009.

N. Stakhanova, Y. Li, and A. A. Ghorbani, "Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices," 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, St. John's, NL, pp. 29-37, Aug. 2009.

M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, pp. 1-6, Jul. 2009.

W. Lu, M. Tavallaee, G. Rammidi, and A. A. Ghorbani, "BotCop: An Online Botnets Traffic Classifier," 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, NB, pp. 70-77, May 2009.

M. Tavallaee, W. Lu, and A. A. Ghorbani, "Online Classification of Network Flows," 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, NB, pp. 78-85, May 2009.

W. Lu, M. Tavallaee, and Ali. A. Ghorbani, "Automatic Discovery of Botnet Communities on Large-Scale Communication Networks," 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS, Sydney, Australia, pp. 1-10, Mar. 2009.

W. Lu and A. A. Ghorbani, "Botnets Detection Based on IRC-Community," IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, New Orleans, LA, pp. 1-5, Nov.-Dec. 2008.

W. Lu and A. A. Ghorbani. "Bots Behaviours vs. Human Behaviours on Large-Scale Communication Networks (Extended Abstract)," 11th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID 2008), Cambridge, MA, pp. 415-416, Sep. 2008.

R. Sadoddin and A. A. Ghorbani, "Real-time Alert Correlation Using Stream Data Mining Techniques," 20th Conference on Innovative Applications of Artificial Intelligence (IAAI'08), Chicago, IL, pp. 1731-1737, Jul. 2008.

W. Lu, M. Tavallaee, and A. A. Ghorbani, "Detecting Network Anomalies Using Different Wavelet Basis Functions," 6th Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 149-156, May 2008.

M. Tavallaee, W. Lu, S. A. Iqbal, and A. A. Ghorbani, "A Novel Covariance Matrix Based Approach for Detecting Network Anomalies," 6th Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 75-81, May 2008.

M. Soleimani and A. A. Ghorbani, "Critical Episode Mining in Intrusion Detection Alerts," 6th Annual Communication Networks and Services Research Conference (cnsr 2008), Halifax, NS, pp. 157-164, May 2008.

N. Stakhanova, O. Stakhanov, and A. Ghorbani, "A Behavioral Model of Ideologically-motivated “Snowball” Attacks," 2008 Third International Conference on Availability, Reliability and Security, Barcelona, Spain, pp. 88-95, Mar. 2008.

I.-V. Onut and A. A. Ghorbani, "A Comprehensive Fuzzy Logic Model for Feature Performance Assessment  against Network Attacks," Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), Waikoloa, HI, pp. 203-203, Jan. 2008.

R. Sadoddin and A. A. Ghorbani, "A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection," 5th International Conference in Machine Learning and Data Mining in Pattern Recognition (MLDM07), Leipzig, Germany, pp. 404-418, Jul. 2007.

M. Nadjarbashi-Noghani and A. A. Ghorbani, "Design and Implementation of a Behavioral Difference Analyzer for Network Intrusion Detection," PST06: International Conference on Privacy, Security and Trust (PST), Markham, ON, pp. 1-5, Oct. 2006.

R. Sadoddin and A. A. Ghorbani, "Alert Correlation Survey : Framework and Techniques," PST06: International Conference on Privacy, Security and Trust (PST), Markham, ON, pp. 6-15, Oct. 2006.

I.-V. Onut and A. A. Ghorbani, "Toward a feature classification scheme for network intrusion detection," 4th Annual Communication Networks and Services Research Conference (CNSR'06), Moncton, NB, pp. 277-284, May 2006.

I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: A network host-centered anomaly visualization technique," International Conference on Information Security (ISC), Singapore, pp. 16-28, Sep. 2005.

I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: Visual identification of scanning and denial of service attacks," International Conference on Information Security (ISC), Singapore, pp. 1741-1744, Sep. 2005.

I.-V. Onut, B. Zhu, and A. A. Ghorbani, "A novel visualization technique for network anomaly detection," 2nd Annual Conference on Privacy, Security and Trust (PST), Fredericton, NB, pp. 167-174, Oct. 2004.


PhD/MSc theses

M. Yadollahi, "A Query-Efficient Black-box Adversarial Attack on Text Classification Deep Neural Networks," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.

H. Azimy, "Difficulty Adjustment Algorithms for Preventing Proof-of-Work Mining Attacks," PhD thesis, Faculty of Computer Science, UNB, Fredericton, 2022.

M. Abrishami, "An Effective Approach to Detect Label Noise," Master thesis, Faculty of Computer Science, UNB, Fredericton, 2022.


B. Arbab, "Waffle: A Whitebox AFL-based Fuzzer for discovering Exhaustive Executions," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2021.

M. Safi, "Distributive Continuous Profiling for IoT Devices," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2021.

M. S. Shuvo, "Membership Inference Attacks on Machine Learning Models: Analysis and Mitigation," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2021.

M. Erfani, "Achieving more effective fraud detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2021.

H. Mahdikhani, "Achieving Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2021.

S. Mahdavifar, "Explainable Deep Learning for Detecting Cyber Threats," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.

S. S. Hasanabadi, "Game-theoretic defensive approaches for forensic investigators against anti-forensics," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.

N. Mahmoudyar, "Graph-Based IoT Malware Family Classification," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2021.


K. K. B. Larbi, "Achieving continuous privacy-preserving histogram query in smart grid communications," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2020.

M. MontazeriShatoori, “An anomaly detection framework for DNS-over-HTTPS (DoH) tunnel using time-series analysis,” Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2020.

M. K. Foumani, "On the evaluation of adversarial vulnerabilities of deep neural networks," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2020.

S. Upadhyay, "Domain generation algorithm (DGA) detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2020.

A. J. Sobeck, "Issues in the implementation of multiplication and factoring algorithms in Galois fields," Master thesis, Faculty of Computer Science, UNB, Fredericton, May 2020.

L. Taheri, "Investigating suspected background processes in Android malware classification through dynamic automated reverse engineering and semi-automated debugging," Master thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2020.

G. A. Zendehdel, "A semi-automated security assessment framework for wearable health monitoring devices," Master thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2020.


N. Maleki, "A behavioral based detection approach for business email compromises," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.

M. R. Fatemi, "Threat-hunting in Windows environment using host-based log data," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.

J. O. Josiah, "Authentication in a body area network (BAN) using OpenSSL," Master thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2019.

A. Matyukhina, "Feasibility of deception in code attribution," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2019.


A. F. Abdul Kadir, "A detection framework for android financial malware," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Dec. 2018.

N. I. Yekta, "Communication-efficient privacy-preserving query for fog-enhanced Internet of Things," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2018.

J. Iqbal, "Detection and prevention of changes in the DOM tree," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2018.

X. Zhang, “A deep learning-based framework for detecting and visualizing online malicious advertisement,” Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2018.


Y. Ning, "Fingerprinting Android obfuscation tools using visualization," Master thesis, Faculty of Computer Science, UNB, Fredericton, Nov. 2017.

A. Ghraib, "DNA-Droid: a real-time Android ransomware detection framework," Master thesis, Faculty of Computer Science, UNB, Fredericton, Nov. 2017.

V. Kalgutkar, "Android authorship attribution through string analysis," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2017.

H. F. G. Robledo, "An automatic authorship attribution technique for Android applications," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2017.

K. F. Mbah, "A Phishing e-mail detection approach using machine learning techniques," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2017.


A. Alzahrani, "SMS Mobile Botnet Detection Framework," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.

H. H. Jazi, "Dynamic Graph-Based Malware Classifier," Master thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.

A. J. Alzahrani, "An SMS-based mobile botnet detection framework using intelligent agents," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2016.

Y. Li, "METADroid: lightweight Android classification using meta-data," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2016.

H. Minaee, "A sarcasm detection framework in Twitter and blog posts based on varied range of features sets," Master thesis, Faculty of Computer Science, UNB, Fredericton, Sep. 2016.


A. Pourafshar, "A genetic-algorithm-based solution for HTTP-based malware signature generation," Master thesis, Faculty of Computer Science, UNB, Fredericton, Feb. 2014.

S. Gu, "Peer to peer botnet detection based on node traffic behavior," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jan. 2013.

M. Tavallaee, "An Adaptive Hybrid Intrusion Detection System," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2011.

S. A. Iqbal, "Automatic Rule Tuning in Intrusion Detection Systems: Online and Offline," Master thesis, Faculty of Computer Science, UNB, Fredericton, Aug. 2009.

M. Soleimani, "Multi-layer Episode Filtering for the Multi-step Attack Detection," Master thesis, Faculty of Computer Science, UNB, Fredericton, Oct. 2008.

I.-V. Onut, "A Fuzzy Feature Evaluation Framework for Network Intrusion Detection," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2008.

M. Nadjarbashi, "Differential Intrusion Detection Architecture and Analysis," PhD thesis,  Faculty of Computer Science, UNB, Fredericton, Jul. 2007.

R. Sadoddin, "An Incremental Frequent Structure Mining Framework for Real-time Alert Correlation," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jul. 2007.

H. Nayyar, "Multi-scale Time Series Prediction for Intrusion Detection," Master thesis,  Faculty of Computer Science, UNB, Fredericton, Apr. 2006.

M. Shajari, "Enhancing Network Survivability Using Intelligent Agents," PhD thesis, Faculty of Computer Science, UNB, Fredericton, Apr. 2005.

B. Zhu, "Alert correlation for extracting attack strategies," Master thesis, Faculty of Computer Science, UNB, Fredericton, Jun. 2005.


Technical reports

H. Azimy, A. Ghorbani, and E. Bagheri, “A new difficulty adjustment algorithm for preventing selfish mining attack,” Canadian Institute for Cybersecurity, Tech.Rep. CIC TR2021-04, July 2021, [available upon request].

Patents

Ghorbani, A. H. Lashkari, G. D. Gill, and M. S. I. Mamun, “Systems and Methods for Cybersecurity Risk Assessment of Users of a Computer Network,” US Patent No. 20200244693 A1, submitted 2018, published Jul. 2020.

Ghorbani, I-V. Onut, N. Stakhanova, and W. Bird, “System and method for simulating network attacks,” US Patent No. 8160855, Apr. 2012. Assigned to IBM.

N. Stakhanova, A. Ghorbani, and W. Bird. “Graph structures for event matching,” US Patent No. 9413598B2, Aug. 2009.