Publications | Research | Canadian Institute for Cybersecurity | UNB

Global Site Navigation (use tab and down arrow)

Canadian Institute for Cybersecurity

Publications

Books | Journals | Conferences | PhD/MSc theses | CIC Technical Reports | Patents

Books

G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, "Understanding Cybersecurity Risk in FMI using HPC,” in Cybersecurity & High-Performance Computing Environments, Taylor & Francis, 2022.

C. L. Chowdhary, M. Alazab, A. Chaudhary, S. Hakak, & T. R. Gadekallu, Eds, Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches: Fundamentals, technologies and applications: Institution of Engineering and Technology, 2021.

G. Kaur, Z. Habibi Lashkari, and A. Habibi Lashkari, Understanding Cybersecurity Management in FinTech:  Challenges, Strategies, and Trends, Switzerland:  Springer International Publishing, 2021.

G. Kaur and A. Habibi Lashkari, "Information Technology Risk Management,” in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds.  Cham:  Springer, 2021.

G. Kaur and A. Habibi Lashkari, "An Introduction to Security Operations," in Advances in Cybersecurity Management, K. Daimi and C. Peoples, Eds.  Cham:  Springer, 2021.

X. Zhang and A. A. Ghorbani, "Human Factors in Cybersecurity: Issues and Challenges in Big Data," in Security, Privacy, and Forensics Issues in Big Data, IGI Global, 2020, pp 66-96.

N. Stakhanova, and A. A. Cardenas, "Analysis of Metrics for Classification Accuracy in Intrusion Detection," in Empirical Research for Software Security: Foundations and Experience, L. Othmane, M. G. Jaatun, and E. Weippl, Eds.  Boca Raton:  CRC Press, 2018.

A. A. Kadir, N. Stakhanova, and A. A. Ghorbani, "An empirical analysis of Android banking malware," in Protecting Mobile Networks and Devices: Challenges and Solutions, W. Meng, X. Luo, J. Zhou, and S. Furnell, Eds.  New York:  Auerbach Publications, 2017.

H. Gonzalez, M.-A. Gosselin-Lavigne, N. Stakhanova, and A. A. Ghorbani, "The impact of application layer denial of service attacks," in Case Studies in Secure Computing - Achievements and Trends, B. Issac and N. Israr, Eds.  New York:  Auerbach Publications, 2015.

P. Kabiri and A. A. Ghorbani, "Dimension reduction and its effects on Clustering for Intrusion Detection," in Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, P. Kabiri, Ed.  IGI Global, 2011.

A. A. Ghorbani, W. Lu, and M. Tavallaee, "Network Intrusion Detection and Prevention - Concepts and Techniques, Springer Series," in Advances in Information Security Series, Vol.47.  New York:  Springer-Verlag US, 2010.

Journals

These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

2021

2020

2019

2018

2017

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

  • P. Kabiri and A. A. Ghorbani, "Research on Intrusion Detection and Response: A Survey," International Journal of Network Security, vol. 1, no. 2, pp. 84-102, Sep. 2005.

Conferences

These documents are made available to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each copyright.

2021

  • D. Keyes, B. Li, G. Kaur, A. Lashkari, "Entroplyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics," Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.
  • A. Lashkari, B. Li, T. Carrier, and G. Kaur, “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering,” Reconciling Data Analytics, Automation, Privacy, and Security (RDAAPS), Hamilton, ON, 2021.
  • K. Boakye-Boateng, I. S. R. Siahaan, A. H. Al Muktadir, D. Xu and A. A. Ghorbani, "Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection," 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), Espoo, Finland, Oct. 2021.
  • K. Boakye-Boateng. A. A. Ghorbani, and A. H. Lashkari, "RiskISM: A Risk Assessment Tool for Substations," 2021 IEEE 9th International Conference on Smart City and Informatization (iSCI) 2021, Shenyang, China, Oct. 2021.
  • N. Mashtalyar, T. Santos, U. N. Ntaganzwa, S. Hakak, and S. Ray, "Social Engineering Attacks: Recent Advances and Challenges," 23rd International Conference on Human-Computer Interaction, Washington, DC, Jul. 2021. 
  • A. H. Al Muktadir, I. S. R. Siahaan, K. Boakye-Boateng, D. Xu, and A. A. Ghorbani, "Recommending Location for Placing Data Collector in the OPC Classic," 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS), Victoria, BC, May 2021.

 2020

2019

2018

2017

2016

2015

2014

2013

2012

2011

2010

2009

2008

2007

2006

2005

  • I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: A network host-centered anomaly visualization technique," International Conference on Information Security (ISC), Singapore, pp. 16-28, Sep. 2005.
  • I.-V. Onut, B. Zhu, and A. A. Ghorbani, "SVision: Visual identification of scanning and denial of service attacks," International Conference on Information Security (ISC), Singapore, pp. 1741-1744, Sep. 2005.

2004

PhD/MSc theses

CIC Technical Reports

  • H. Azimy, A. Ghorbani, and E. Bagheri, “A new difficulty adjustment algorithm for preventing selfish mining attack,” Canadian Institute for Cybersecurity, Tech.Rep. CIC TR2021-04, July 2021, [available upon request].

Patents