PUBLICATIONS

BOOKS:

    • Intro to Cryptography, Reference for Master of information security (AeU University), Malaysia
    2009
    • Mobile Communication, Reference for Master of information security (AeU University), Malaysia
    2009

    PATENTS:

    • "US 2020/0244693 A1:" Systems and Methods for Cybersecurity Risk Assessment of Users of a Computer Network", Submitted 2018, Published Jul 2020
    2020

    Book chapters:

    2021
    2021
    2021

    ARTICLES:

    • 121. “Intruders behavior Unveiled: Toward Generating an Intrusion Detection Dataset and Intruders Behavioral Profiling using Network Layer Traffic Characterization”, MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari, International Journal of Information Security, 2024
    2024
    • 120. “Identifying Malware Packers Through Multi-layer Feature Engineering in Static Analysis”, Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, Information Security and Privacy, Vol. 15, 2024
    2024
    • 119. “Implementation of a Trust-Based Framework for Substation Defense in the Smart Grid”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, Smart Cities, Vol. 7 (1), 99-140, 2023
    2023
    • 118. “Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning”, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023
    2023
    • 117. “A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges”, Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, Pulei Xiong, Shahrear Iqbal, Journal of Information and Intelligence, 2023
    2023
    • 116. “Unveiling Vulnerable Smart Contracts: Toward Profiling Vulnerable Smart Contracts using Genetic Algorithm and Generating Benchmark Dataset”, Sepideh Hajihosseinkhani, Arash Habibi Lashkari, Ali Mizani, Blockchain: Research and Applications, Vol. 4, 2023
    2023
    • 115. “Unveiling DoH Tunnel: Toward Generating a Balanced DoH EncryptedTraffic Dataset and Profiling malicious Behaviour using InherentlyInterpretable Machine Learning”, Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari, Peer-to-Peer Networking and Applications, Vol. 17, 2023
    2023
    • 114. “Detection, Characterization and Profiling DOH Malicious Traffic UsingStatistical Pattern Recognition”, Sepideh Niktabe, Arash Habibi Lashkari, Dilli Sharma, International Journal of Information Security, Vol. 22, 2023
    2023
    • 113. “IoT Malware: An Attribute-based Taxonomy, Detection Mechanisms and Challenges”, Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal, Peer-to-Peer Networking and Applications, Vol. 16, 2023
    2023
    • 112. “A survey on run-time packers and mitigation techniques”, Ehab Mufid Shafiq Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari, International Journal of Information Security, Vol. 22, 2023
    2023
    • 111. “A Gradient-based Approach for Adversarial Attack on Deep Learning-based Network Intrusion Detection Systems”, Hesamodin Mohammadian, Ali Ghorbani, Arash Habibi Lashkari, Applied Soft Computing, Vol. 137, 2023
    2023
    • 110. “IoT Malware Analysis Using Federated Learning: A Comprehensive Survey”, Madumitha Venkatasubramanian, Arash Habibi Lashkari, and Saqib Hakak, IEEE Access, Vol. 11, 2023
    2023
    • 109. “Securing Substations with Trust, Risk Posture, and Multi-Agent Systems: A Comprehensive Approach”, Kwasi Boakye-Boateng, Ali Ghorbani, Arash Habibi Lashkari, 20th International Conference on Privacy, Security, and Trust (PST2023), 2023
    2023
    • 108. “An Evolutionary Algorithm for Adversarial SQL Injection Attack Generation”, Maryam Issakhani, Mufeng Huang, Mohammad A. Tayebi, Arash Habibi Lashkari, IEEE Intelligence and Security Informatics (ISI2023), NC, USA
    2023
    • 107. “Detecting IMAP Credential Stuffing Bots Using Behavioural Biometrics”, Ashley Barkworth, Rehnuma Tabassum and Arash Habibi Lashkari, 12th International Conference on Communication and Network Security (ICCNS12), China
    2023
    • 106. “Robust Stacking Ensemble Model For Darknet Traffic Classification Under Adversarial Settings”, Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Lashkari, Computers & Security, Vol 120, 2022
    2022
    • 105. “AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution framework”, Abhishek Chopra, Nikhill Vombatkere and Arash Habibi Lashkari, ICCNS '22: Proceedings of the 2022 12th International Conference on Communication and Network Security, 2022
    2022
    • 104. “QKeyShield: A practical receiver-device-independent entanglement-swapping-based quantum key distribution”, Mohammaed Aldarwbi, Ali Ghorbani, and Arash Habibi Lashkari, IEEE Access, 2022
    2022
    • 103. “The Sound of Intrusion: A Novel Network Intrusion Detection System”, Mohammaed Aldarwbi, Arash Habibi Lashkari, and Ali Ghorbani, Computers and Electrical Engineering, Vol 130, 2022
    2022
    • 102. “A Trust-Influenced Smart Grid: A Survey and A Proposal”, Kwasi Boakye-Boateng, Ali Ghorbani, and Arash Lashkari, Journal of Sensor and Actuator Networks, Vol 11(3), 34, 2022
    2022
    • 101. “Memory Forensics Tools: A Comparative Analysis”, Mahdi Daghmehchi Firoozjaeia, Arash Habibi Lashkari, and Ali A. Ghorbanic, Journal of Cyber Security Technology, Vol 6, 2022
    2022
    • 100. “Detecting Obfuscated Malware using Memory Feature Engineering”, Tristan Carrier , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
    2022
    • 99. “Evaluating Deep Learning-based NIDS in Adversarial Settings", Hesamodin Mohammadian , Arash Habibi Lashkari and Ali A. Ghorbani, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
    2022
    • 98. “PDF Malware Detection based on Stacking Learning", Maryam Issakhani , Princy Victor , Ali Tekeoglu and Arash Lashkari, Proceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 2022
    2022
    • 97. “A memory-based game-theoretic defensive approach for digital forensic investigators", Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani, Forensic Science International: Digital Investigation, Volume 38, 2021
    2021
    • 96. “Towards Query-efficient Black-box Adversarial Attack on Text Classification Models”, Mohammad Mehdi Yadollahi, Arash Habibi Lashkari, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
    2021
    • 95. “A Novel Trust Model in Detecting Final-Phase Attacks in Substations”, Kwasi Boakye-Boateng, Ali A. Ghorbani, Arash Habibi Lashkari, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
    2021
    • 94. “User Profiling on Universal Data Insights tool on IBM Cloud Pak for Security”, Farzaneh Shoeleh, Masoud Erfani, Saeed Shafeiee Hasanabadi, Duc-Phong Le, Arash Habibi Lashkari, Adam Frank, Ali A. Ghorbani, The 18th International Conference on Privacy, Security and Trust (PST), 2021, Auckland, New Zealand.
    2021
    • 93. “Adaptive User Profiling with Online Incremental Machine Learning for Security Information and Event Management”, Dilli P. Sharma, Barjinder Kaur, Farzaneh Shoeleh, Masoud Erfani, Duc-Phong Le, Arash Habibi Lashkari, Ali A. Ghorbani, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2021), 2021, Athens, Greece.
    2021
    • 92. “Lightweight Hybrid Data Exfiltration using DNS based on Machine Learning”, Samaneh Mahdavifar, Amgad Hanafy Salem, Princy Victor, Miguel Garzon, Amir H. Razavi, Natasha Hellberg, Arash Habibi Lashkari, The 11th IEEE International Conference on Communication and Network Security (ICCNS), Dec. 3-5, 2021, Beijing Jiaotong University, Weihai, China.
    2021
    • 91. “Classifying Malicious Domains using DNS Traffic Analysis", Samaneh Mahdavifar, Nasim Maleki, Arash Habibi Lashkari, Matt Broda, Amir H. Razavi, The 19th IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC), Oct. 25-28, 2021, Calgary, Canada
    2021
    • 90. “EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics", David Sean Keyes, Beiqi Li, Gurdip Kaur, Arash Habibi Lashkari, Francois Gagnon, Fred´ eric Massicotte, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada
    2021
    • 89. “VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering", Arash Habibi Lashkari, Beiqi Li, Tristan Lucas Carrier, Gurdip Kaur, Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), McMaster University, ON, Canada
    2021
    • 88. “A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents’ behaviour", Saeed Shafiee Hasanabadi, Arash Habibi Lashkari and Ali A. Ghorbani, Forensic Science International: Digital Investigation, vol 35, pages 301024, 2020
    2020
    • 87. “KeyShield: A scalable and quantum-safe key management scheme", A Mohammed Y., AA Ghorbani, A Habibi Lashkari, IEEE Open Journal of the Communications Society, December 2020
    2020
    • 86. “Classifying and clustering malicious advertisement uniform resource locators using deep learning", Xichen Zhang, Arash Habibi Lashkari, Ali Ghorbani, Computational Intelligence, Wiley, September 2020
    2020
    • 85. “A game-theoretic defensive approach for forensic investigators against rootkits", Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A.Ghorbani, Forensic Science International: Digital Investigation, Volume 32, March 2020
    2020
    • 84. “DIDarknet: A Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning", Arash Habibi Lashkari, Gurdip Kaur, Abir Rahal, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020
    2020
    • 83. “DIDroid:Android Malware Classification and Characterization Using Deep Image Learning", Abir Rahali, Arash Habibi Lashkari, Gurdip Kaur, Laya Taheri, Francois Gagnon, Frédéric Massicotte, The 10th International Conference on Communication and Network Security (ICCNS2020), Tokyo, Japan, September 2020
    2020
    • 82. “Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic", Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur and Arash Habibi Lashkari, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020
    2020
    • 81. “Intrusion Traffic Detection and Characterization using Deep Image Learning", Gurdip Kaur, Arash Habibi Lashkari and Abir Rahali, The 5th Cyber Science and Technology Congress (2020) (CyberSciTech 2020), Vancouver, Canada, August 2020
    2020
    • 80. “Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls", Laya Taheri, Andi Fitriah Abdulkadir, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019
    2019
    • 79. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy", Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, and Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019
    2019
    • 78. “Securing GOOSE: The Return of One-Time Pads", Kwasi Boakye, Arash Habibi Lashkari, The IEEE (53rd) International Carnahan Conference on Security Technology, India, 2019
    2019
    • 77. “An Evaluation Framework For Network Security Visualizations", Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani, Computers & Security, Volume 84, July 2019, Pages 70-92
    2019
    • 76. “Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy", Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani, IEEE 53rd International Carnahan Conference on Security Technology, Chennai, India, 2019, Pages 70-92
    2019
    • 75. “Probabilistic Classification for Industrial Cyber Risk Using Deep Neural Network", Xichen Zhang, Arash Habibi Lashkari, Nasim Maleki, Joseph F. Mudge, Ali A. Ghorbani, Computers & Security, The 2019 International Conference on Security and Management (SAM2019), USA
    2019
    • 74. “A Survey on User Profiling Models for Anomaly Detection in Cyberspace",Arash Habibi Lashkari, Min Chen, Ali A. Ghorbani, Journal of Cyber Security and Mobility, Vol 2, 2018
    2018
    • 73. “Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification, Arash Habibi Lashkari, Laya Taheri, Andi Fitriah, Ali Ghorbani, Proceeding of the IEEE ICCST'18, Montreal, Quebec, Oct. 2018
    2018
    • 72. “The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals", Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali Ghorbani, Proceeding of the IEEE ICCST'18, Montreal, Quebec, Oct. 2018
    2018
    • 71. “Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization", Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, 4th International Conference on Information Systems Security and Privacy (ICISSP), Purtogal, January 2018
    2018
    • 70. “Towards a Reliable Intrusion Detection Benchmark Dataset", Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari and Ali A. Ghorbani, Software Networking, Vol 2017, Issue:1, pp 177-200, January 2018
    2018
    • 69. “Towards a Network-Based Framework for Android Malware Detection and Characterization", Arash Habibi Lashkari, Andi Fitriah A.Kadir, Hugo Gonzalez, Kenneth Fon Mbah and Ali A. Ghorbani, In the proceeding of the 15th International Conference on Privacy, Security and Trust, PST, Calgary, Canada, 2017
    2017
    • 68. “A Survey Leading to a New Evaluation Framework for Network-based Botnet Detection", Arash Habibi Lashkari, Gerard Draper Gil, Jonathan Edward Keenan, Kenneth Fon Mbah, Ali A. Ghorbani, 7th International Conference on Communication and Network Security (ICCNS 2017), Tokyo, Japan, 2017
    2017
    • 67. “A Phishing Email Detection Approach Using Machine Learning Techniques", Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani, The World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Vol:4, No:1
    2017
    • 66. “Characterization of Tor Traffic Using Time Based Features", Arash Habibi Lashkari, Gerard Draper-Gil, Mohammad Saiful Islam Mamun and Ali A. Ghorbani, In the proceeding of the 3rd International Conference on Information System Security and Privacy, SCITEPRESS, Porto, Portugal
    2017
    • 65. “Detecting Malicious URLs Using Lexical Analysis", Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani, NSS16, 467-482
    2016
    • 64. “An Evaluation Framework for Intrusion Detection Dataset", Amirhossein Gharib, Iman Sharafaldin, Arash Habibi Lashkari and Ali A. Ghorbani, International Conference on Information Science and Security (ICISS), IEEE, Thailand
    2016
    • 63. “Characterization of Encrypted and VPN Traffic Using Time-Related Features", Gerard Drapper Gil, Arash Habibi Lashkari, Mohammad Mamun, Ali A. Ghorbani, In Proceedings of the 2nd International Conference on Information Systems Security and Privacy(ICISSP 2016) , pages 407-414, Rome , Italy
    2016
    • 62. “Cloud Computing Data Center Adoption Factors Validity by Fuzzy AHP", Nasrin Badie, AB Razak CHE Hussin, Arash Habibi Lashkari, International Journal of Computational Intelligence Systems, Vol. 8, No. 5: 854-873.
    2015
    • 61. “Novel Security Conscious Evaluation Criteria for Web Service Composition Research journal of Applied Science", Homa Movahednejad, Suhaimi BIN Ibrahim, Mahdi Sharifi, Harihodin BIN Salamat, Arash Habibi Lashkari and Sayed Gholam Hassan Tabatabaei, Engineering and Technology, Vol. 7 , No. 4, 673-695.
    2014
    • 60. “QoS-aware Evaluation Criteria for Web Service Composition", Homa Movahednejad, Suhaimi Bin Ibrahim, Mahdi Sharifi, Harihodin Bin Salamat, Arash Habibi Lashkari and Sayad Gholam Hassan Tabatabaei, Journal of Theoretical and Applied Information Technology, Vol. 59, No. 1, 27-44.
    2014
    • 59. “A New Graphical Password Based on Decoy Image Portions (GP-DIP)”, Mohsin R. Albayati, Arash Habibi Lashkari, The 2014 International Conference Applied Mathematics, Computational Science & Engineering (AMCSE), Bulgaria.
    2014
    • 58. “Pass-Coob a New Graphical Password Based Oncolors And Objects”, Ahmad Z. El-Rufai, Arash Habibi Lashkari, International Conference on Advances in Information Processing and Communication Technology (IPCT), Italy.
    2014
    • 57. “An Efficient Load Balancing Algorithm for Virtualized Cloud Data Centres”, Ali Naser Abdulhussein Abdulhussein, Atwine Mugume Twinamatsiko, Jugal Harshvadan Joshi, Arash Habibi Lashkari, Mohammad Sadeghi, The International Conference on Circuits, Systems, Signal Processing, Communications and Computers (CSSCC), Italy.
    2014
    • 56. “Tri-Pass: A New Graphical User Authentication Scheme”, Elmira Yesseyeva, Kanat Yesseyev, Mustafa M. Abdulrazaq, Arash Habibi Lashkari, Mohammad Sadeghi, International Journal of Circuits, Systems and Signal Processing, Bulgaria.
    2014
    • 55. “An Enhanced Quality Model For Iaas Provider With Non-Quantifiable Key Performance Indicators", Jugal Harshvadan Joshi, Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Arash Habibi Lashkari, Mohammad Sadeghi, 3rd International Conference on Information Computer Application (ICICA), Barcelona, Spain.
    2014
    • 54. “Dynamic Workload Performance Optimization Model for Multiple-Tenancy in Cloud Systems", Atwine Mugume Twinamatsiko, Ali Naser Abdulhussein Abdulhussein, Jugal Harshvadan Joshi, Arash Habibi Lashkari and Mohammad Sadeghi, IJCSI Journal, Vol 10, Issue 6.
    2013
    • 53. “A New Evaluation Criteria for Effective Security Awareness in Computerrisk Management Based on AHP", Nasrin Badie, Arash Habibi Lashkari, Journal of Basic and Applied scientific Research, Vol. 2, No. 9, 9331-9347.
    2012
    • 52. “Graphical Password Security Evaluation Criteria by Fuzzy Analytical Hierarchical Process”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, ISI Journal of Basic and Applied Scientific Research (JBAS).
    2012
    • 51. “Mobile Wifi-Based Indoor Positioning System”, Mike Ng Ah Ngan, Mohammed Abdul Karim, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 10 No. 3, USA.
    2012
    • 50. “Mobile Edutainment Application for Children Brain Development and Logical Thinking”, Behrang Parhizkar, Ali Garba Garba Bade Aliyu Musa, Zahra Mohana Gebril, Anand Ramachandran, Arash Habibi Lashkari, Ireland International Conference On Education (IICE), Ireland.
    2012
    • 49. “Web-Based Ar Advertising & Branding For Proton Company”, Ashraf Abbas M. Al-Modwahi, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 2.
    2012
    • 48. “Android Mobile Augmented Reality Application Based on Different Learning Theories for Primary School Children”, Behrang Parhizkar, Waqas Khalid Obeidy, Shahan Ahmad Chouwdhary, Zahra Mohana Gebril, Mike Ng Ah Ngan, Arash Habibi Lashkari, International Conference on Multimedia Computing and Systems (ICMCS), Tangier, Morocco.
    2012
    • 47. “Ubiquitous Medical Learning Using Augmented Reality Based on Cognitive Information Theory”, Zahra Mohana Gebril, Imam Musa Abiodunde Tele, Mohammed A.Tahir, Behrang Parhizkar, Anand Ramachandran, Arash Habibi Lashkari, The Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Published by Springer, India.
    2012
    • 46. “A Secure Recognition Based Graphical Password By Watermarking”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, 11th IEEE International Conference on Computer and Information Technology, Cyprus.
    2011
    • 45. “A Survey on Image Steganography Algorithms and Evaluation”, Arash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud, The International Conference on Digital Information Processing and Communications (ICDIPC), Publish by Springer, Czech Republic.
    2011
    • 44. “Awareness for the Protection of Endangered Species with Augmented Reality”, Behrang Parhizkar, Koh Boon San, Arash Habibi Lashkari;, International Conference on Computer Design and Engineering (ICCDE), Kuala Lumpur, Malaysia.
    2011
    • 43. “Theoretical Model for Automating Students”, Seyed Mostafa Hosseini, Denis Bantariza, Mohammed M I Awad, Behrang Parhizkar, Arash Habibi Lashkari, Services in Universities, 3rd International Conference on Machine Learning and Computing (ICMIC), Singapore.
    2011
    • 42. “Privacy and Vulnerability Issues of Social Networks (Facebook)”, Anand Ramachandran, Behrang Parhizkar , Sujata Navaratnam, Arash Habibi Lashkari, International Conference on Internet Technology and Security (ITS), Ei Compendex and Thamson ISI Indexing , China.
    2011
    • 41. “Challenges Of Software Development”, Yasaman Talaei Rad, Hamed Esfandiari, Behrang Parhizkar, Arash Habibi Lashkari, 3rd International Conference on Machine Learning and Computing (ICMLC), Singapore.
    2011
    • 40. “Wired and Wireless Food Ordering Model for Universities Supported by Web Services”, Mohammed M I Awad, Moses Busumu, Behrang Parhizkar, Yap Sing Nian, Arash Habibi Lashkari International Journal of Computer and Network Security (IJCNS), Austria.
    2011
    • 39. “A Survey on Web-Based AR Applications”, Behrang Parhizkar,Ashraf Abbas M. Al-Modwahi,Mohammad Mehdi Bartaripou, Hossein Reza Babae, Arash Habibi Lashkari, International Journal of Computer Science Issues (IJCSIS), Vol. 8, Issue 4.
    2011
    • 38. “Mobile Phone Augmented Reality Business Card”, Edmund Ng Giap Wen, Teo Tzong Ren, Behrang Parhizkar, Arash Habibi Lashkari International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.
    2011
    • 37. “Augmented Reality for Museum Artifacts Visualization”, Edmund Ng Giap Wen, Lina Chai Hsiao Ping, Behrang Parhizkar, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, No. 5, USA.
    2011
    • 36. “Wi-Fi Based Indoor Positioning System”, Mike Ng Ah Ngan, Behrang Parhizkar, Mohamed Abdulkarim Mohamedali, Edmund Ng Giap Wen, Arash Habibi Lashkari, International Journal of Computer Science And Network Security (IJCSNS) Vol. 10, No. 9, Korea.
    2011
    • 35. “Users’ Perceptions on Mobile Devices Security Awareness In Malaysia”, Ahmed Sabeeh, Arash Habibi Lashkari, The 6th International Conference for Internet Technology and Secured Transactions (ICITST), UAE.
    2011
    • 34. “Facial Expresion Recognition Based on Improved Eigen Face Detection Algorithm With Visual Control”, Behrang Parhizkar, Muazunasirudanmaliki, Zahra Mohana Gebril, Arash Habibi Lashkari; International Conference on Computer And Computational Intelligence (ICCCI), Thailand.
    2011
    • 33. “Mobile Reservation in Leisure, Hospitality and Transport Industry”, Behrang Parhizkar, Bashir Abdu Muzakkari, Noris Ismail, Sundresan S/O Perumal, Arash Habibi Lashkari, International Conference on Communication Engineering and Networks (ICCEN), Hong Kong.
    2011
    • 32. “A Wide Survey on Botnet”, Seyedeh Ghazal Ghalebandi, Mohammad Reza Moradhaseli, Arash Habibi Lashkari, The International Conference on Digital Information and Communication Technology and Its Applications (DICTAP), Publish by Springer, French.
    2011
    • 31. “A Survey on P2P Botnets Detection”, Seyedeh Ghazal Ghalebandi, Rafidah Binti Md Noor, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN 2011), Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.
    2011
    • 30. “A Survey on Wireless Security Protocols Wi-Fi (802.11) and Wimax (802.16)”, Amirreza Saba, Shahab Alizadeh, Mahdi Khazaei, Arash Habibi Lashkari, International Conference on Communication and Broadband Networking (ICCBN), Asme Digital Library, Indexed by Ei Compendex and Thomson ISI Proceedings, Malaysia.
    2011
    • 29. “Augmented Reality Children Storybook (ARCS)”, Behrang Parhizkar, Tan Yi Shin, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore.
    2011
    • 28. “Augmented Reality Logo Analyzer (ARELA)”, Behrang Parhizkar, Chicco Mokhe, Yap Sing Nian, Arash Habibi Lashkari, International Conference on Future Information Technology (ICFIT), Singapore
    2011
    • 27. “Intelligent Online Document Classification System Using Neural Network”, Behrang Parhizkar, Prasanna Kumari Jaya Kumar, Anand Ramachandran, Arash Habibi Lashkari, International Journal of Computer Science and Information Security (IJCSIS), USA.
    2011
    • 26. “A New Exam Management System Based on Semi-Automated Answer Checking System”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.
    2010
    • 25. “Appliance Mobile Positioning System (AMPS) (An Advanced Mobile Application)”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 1, USA.
    2010
    • 24. “Intelligent Online Course Evaluation System Using Nlp Approach”, International Journal of Computer and Network Security (IJCNS), Austria, Vol. 2, No.7, 2010
    2010
    • 23. “Simulation of Investigating the Earth and Universe Using Interactive Mobile Augmented Reality Based on Smart Evaluation”, International Conference on Imaging Engineering (ICIE 12), Hong Kong.
    2010
    • 22. “Augmented Reality Children Storybook (ARCS)”, International Conference on Future Information Technology (ICFIT), Singapore.
    2010
    • 21. “Augmented Reality Logo Analyzer (ARELA)”, International Conference on Future Information Technology (ICFIT), Singapore.
    2010
    • 20. “A Survey On Dynamic Honeypots”, International Conference on Network Communication and Computer (ICNCC), New Delhi, India.
    2010
    • 19. “Preserving Anonymity of Users Identity in Social Network Sites Using Integrated Algorithm”, International Conference on Information Security and Artificial Intelligence, China.
    2010
    • 18. “Augmented Reality Tourist Catalogue Using Mobile Technology”, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICCRD. 2010
    2010
    • 17. “Wireless Communications Technologies for Energy Networks in A Non-Industrialized Society”, ICCTD, Cairo, Egypt.
    2010
    • 16. “Pc 2 Phone Event Announcer”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 8, No. 5, USA.
    2010
    • 15. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.
    2009
    • 14. “A Wide-Range Survey on Recall-Based Graphical User Authentications Algorithms Based on ISO and Attack Patterns”, Arash Habibi Lashkari, Rosli Saleh, Samaneh Farmand, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 3, USA.
    2009
    • 13. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.
    2009
    • 12. “Shoulder Surfing Attack in Graphical Password Authentication”, Arash Habibi Lashkari, Samaneh Farmand, Rosli Saleh, Omar Bin Zakaria, International Journal of Computer Science and Information Security (IJCSIS), Vol. 6, No. 2, USA.
    2009
    • 11. “A Survey on Bandwidth Allocation Methods in Optical Networks” , Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, International Journal of Computer Theory and Engineering (IJCTE), Singapore.
    2009
    • 10. “A Complete Comparison on Pure and Cued Recall Based Graphical User Authentication”, Arash Habibi Lashkari, Rosli Saleh, Farnaz Towhidi, Samaneh Farmand, Publish by IEEE Computer Society and Thamson ISI Indexing, Dubai, ICCEE.
    2009
    • 9. “QDP Authentication System Over Kerberos”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Ahmed A. Sabeeh, Amirreza Saba; Publish by Ieee Computer Society and Thamson ISI Indexing, Dubai, ICCEE.
    2009
    • 8. “Windows-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Shahram Jazayeri, Daryoush Naghneh Abbaspour, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
    2009
    • 7. “Router-Based Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Daryoush Naghneh Abbaspour, Shahram Jazayeri, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
    2009
    • 6. “Static Bandwidth Allocation in Optical Network”, Arash Habibi Lashkari, Hossein Rouhani Zeidanloo, Ahmed A. Sabeeh, Publish by IEEE Computer Society and Thamson ISI Indexing, Australia, ICCRD.
    2009
    • 5. “A Survey on Wireless Security Protocols (Wep, Wpa and Wpa2/802.11i)”, Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi, Publish by IEEE Computer Society and Thamson ISI Indexing, China, ICCSIT.
    2009
    • 4. “Wired Equivalent Privacy (WEP) Versus Wi-Fi Protected Access (WPA)”, Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh;, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICCDA.
    2009
    • 3. “Wired Equivalent Privacy (WEP)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.
    2009
    • 2. “Binary Decision Diagram (BDD)”, Arash Habibi Lashkari, Farnaz Towhidi, Raheleh Sadat Hosseini, Publish by IEEE Computer Society and Thamson ISI Indexing, Malaysia, ICFCC.
    2009
    • 1. “A Boolean Model in Information Retrieval for Search Engines”, Arash Habibi Lashkari, Fereshteh Mahdavi, Vahid Ghomi, Publish by IEEE Computer Society and Thamson ISI Indexing, Singapore, ICMIE.
    2009

    ACCEPTED PAPER (NOT PUBLISHED)

    • “Challenges of Software Development”, Yasaman Talaei Rad, Hamed Esfandiari, Behrang Parhizkar, Arash Habibi Lashkari, 3rd International Conference on Machine Learning and Computing (ICMLC), Singapore.
    • “Wired And Wireless Food Ordering Model For Universities Supported By Web Services”, Mohammed M I Awad, Moses Busumu, Behrang Parhizkar, Arash Habibi Lashkari, Yap Sing Nian, International Journal of Computer and Network Security (IJCNS), Austria.
    • "Intelligent Online Document Classification System Using Neural Network”, Arash Habibi Lashkari, Behrang Parhizkar, Prasanna Kumari Jaya Kumar, Anand Ramachandran, International Journal of Computer Science and Information Security (IJCSIS), USA.
    Researchers named among top researchers for Canada 150
    The cybersecurity Research and Academic Leadership award, Canada 2019
    The cybersecurity academic award, Canada 2017