Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. I Sharafaldin, AH Lashkari, AA Ghorbani The International Conference on Information Systems Security and Privacy …, 2018 | 3548 | 2018 |
Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy I Sharafaldin, AH Lashkari, S Hakak, AA Ghorbani 2019 international carnahan conference on security technology (ICCST), 1-8, 2019 | 860 | 2019 |
Characterization of Tor Traffic using Time based Features AH Lashkari, GD Gil, MSIMAA Ghorbani The 3rd International Conference on Information Systems Security and Privacy …, 2017 | 787 | 2017 |
Characterization of encrypted and vpn traffic using time-related G Draper-Gil, AH Lashkari, MSI Mamun, AA Ghorbani The 2nd international conference on information systems security and privacy …, 2016 | 760 | 2016 |
A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT R Lu, K Heung, AH Lashkari, AA Ghorbani IEEE access 5, 3302-3312, 2017 | 509 | 2017 |
Toward developing a systematic approach to generate benchmark android malware datasets and classification AH Lashkari, AFA Kadir, L Taheri, AA Ghorbani 2018 International Carnahan conference on security technology (ICCST), 1-7, 2018 | 309 | 2018 |
Towards a reliable intrusion detection benchmark dataset I Sharafaldin, A Gharib, AH Lashkari, AA Ghorbani Software Networking 2018 (1), 177-200, 2018 | 309 | 2018 |
An evaluation framework for intrusion detection dataset A Gharib, I Sharafaldin, AH Lashkari, AA Ghorbani The IEEE International Conference on Information Science and Security (ICISS …, 2016 | 280 | 2016 |
A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i) AH Lashkari, MMS Danesh, B Samadi The 2nd IEEE International Conference on Computer Science and Information …, 2009 | 278 | 2009 |
Characterization of encrypted and VPN traffic using time-related features GD Gil, AH Lashkari, M Mamun, AA Ghorbani Proceedings of the 2nd international conference on information systems …, 2016 | 210 | 2016 |
Detecting malicious urls using lexical analysis MSI Mamun, MA Rathore, AH Lashkari, N Stakhanova, AA Ghorbani The International Conference on Network and System Security, 467-482, 2016 | 203 | 2016 |
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls L Taheri, AFA Kadir, AH Lashkari The International Carnahan Conference on Security Technology (ICCST), 1-8, 2019 | 198 | 2019 |
Shoulder surfing attack in graphical password authentication AH Lashkari, S Farmand, D Zakaria, O Bin, D Saleh International Journal of Computer Science and Information Security (IJCSIS …, 2009 | 194 | 2009 |
Detection of doh tunnels using time-series classification of encrypted traffic M MontazeriShatoori, L Davidson, G Kaur, AH Lashkari 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020 | 165 | 2020 |
Towards a network-based framework for android malware detection and characterization AH Lashkari, AFA Kadir, H Gonzalez, KF Mbah, AA Ghorbani The 15th IEEE Annual Conference on Privacy, Security and Trust (PST), 233-23309, 2017 | 144 | 2017 |
A detailed analysis of the cicids2017 data set I Sharafaldin, A Habibi Lashkari, AA Ghorbani Information Systems Security and Privacy: 4th International Conference …, 2019 | 141 | 2019 |
Didarknet: A contemporary approach to detect and characterize the darknet traffic using deep image learning A Habibi Lashkari, G Kaur, A Rahali Proceedings of the 2020 10th International Conference on Communication and …, 2020 | 114 | 2020 |
A boolean model in information retrieval for search engines AH Lashkari, F Mahdavi, V Ghomi The International Conference on Information Management and Engineering …, 2009 | 93 | 2009 |
Didroid: Android malware classification and characterization using deep image learning A Rahali, AH Lashkari, G Kaur, L Taheri, F Gagnon, F Massicotte Proceedings of the 2020 10th International Conference on Communication and …, 2020 | 81 | 2020 |
Detecting Obfuscated Malware using Memory Feature Engineering. T Carrier, P Victor, A Tekeoglu, AH Lashkari Icissp, 177-188, 2022 | 77 | 2022 |