  {"id":636,"date":"2023-06-07T19:48:09","date_gmt":"2023-06-07T23:48:09","guid":{"rendered":"https:\/\/www.yorku.ca\/research\/bccc\/?page_id=636"},"modified":"2026-03-06T11:42:20","modified_gmt":"2026-03-06T16:42:20","slug":"projects","status":"publish","type":"page","link":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/","title":{"rendered":"Projects\/Sponsors\/Collaborators"},"content":{"rendered":"\n<p>At ¿ì²¥ÊÓÆµ\u2019s Behaviour-Centric Cybersecurity Center (BCCC), we are advancing research and innovation in securing next-generation digital infrastructure by focusing on real-world challenges across IoT, OT, IIoT, DeFi systems, smart contracts, healthcare technologies, and beyond. As a leading center in <strong>Cyber Threat Intelligence (CTI)<\/strong>, BCCC develops and operationalizes intelligence-driven approaches to proactively detect, analyze, and mitigate emerging cyber threats. The rapid evolution of Industry 4.0 has led to a convergence of information technologies (IT) and operational technologies (OT), introducing complex cybersecurity challenges, from zero-day vulnerabilities in smart medical devices to sophisticated attacks on decentralized financial ecosystems and industrial automation systems.<\/p>\n\n\n\n<p>BCCC has developed a series of specialized testbeds using CFI and ORF funding to address the growing need for adaptive and high-quality cybersecurity datasets. These environments replicate real-world conditions across critical domains while maintaining privacy and control. Our current infrastructure includes four active testbeds: (1) a Honeynet environment for malware behavior simulation and threat intelligence gathering; (2) an IoT transportation testbed supporting Connected and Autonomous Vehicle (CAV) network security; (3) a Smart City IoT\/IIoT platform targeting threat analysis in public infrastructure, energy systems, and industrial automation; and (4) a Threat Hunting platform for AI-based malware analysis and intrusion detection in hybrid environments.<\/p>\n\n\n\n<p>In addition, BCCC is pioneering research in DeFi security and smart contract vulnerabilities by modeling transaction behaviors and detecting anomalies in blockchain-based platforms. Our healthcare security efforts focus on protecting wearable and remote monitoring devices, using AI to detect protocol-specific threats in Bluetooth, Zigbee, Z-Wave, and Wi-Fi communications. Through these diverse, multidisciplinary projects, we generate large-scale behavioral datasets and AI-powered detection models to improve cybersecurity resilience across interconnected sectors.<\/p>\n\n\n\n<div class=\"wp-block-group grey-bg-block has-very-light-gray-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns card-deck aspect-ratio fade-bottom is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column card rounded-0 bg-white is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"321\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png\" alt=\"Common Attacks in CAV Networks\" class=\"wp-image-637\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png 624w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02-400x206.png 400w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading card-title h5\">Transportation Network Security<\/h2>\n\n\n\n<p>The rise of connected and automated vehicles (CAVs) presents transformative opportunities for the automobile industry, yet certain obstacles must be overcome before widespread deployment is viable. Incorporating smart devices and communications into CAVs introduces critical cybersecurity risks and safety considerations. Unfortunately, these systems' interconnected nature and automation render them more susceptible to cyberattacks, including in-vehicle attacks and communication breaches. Consequently, new cybersecurity risks emerge. However, connectedness and automation make these systems more vulnerable and increase the consequences of cyberattacks, including in-vehicle attacks (e.g., hijacking attacks) and vehicle-to-everything communication attacks (e.g., data theft), introducing new cybersecurity risks. The consequences of a CAV being hacked could result in compromised features, resulting in accidents, damage, financial loss, personal injury, and even death. The objective of this R&amp;D project is to design, develop, and implement an intelligence-driven solution as a holistic countermeasure and evaluate the final solution in our CAV test-bed, including more than 32 transportation network IIoT devices.<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column card rounded-0 bg-white is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"431\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/IIoTSecurity.png\" alt=\"IoT and IIoT Network Security\" class=\"wp-image-640\" style=\"width:324px;height:218px\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/IIoTSecurity.png 640w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/IIoTSecurity-400x269.png 400w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading card-title h5\">IoT and IIoT Network Security<\/h2>\n\n\n\n<p>Recently, the increasing popularity of the Internet of Things (IoT) has opened up promising opportunities for advancing home automation systems and various industrial applications. This has led to the emergence of the Industrial Internet of Things (IIoT), bringing automation to industries. However, with these advancements, IoT faces numerous cybersecurity challenges requiring innovative approaches to ensure robust security. Furthermore, the security vulnerabilities associated with IIoT are even more concerning. This R&amp;D project aims to address these challenges by extensively researching cybersecurity threats and their management within IoT and IIoT network traffic. The insights gained from this research will be utilized to propose, design, and develop several intelligence-driven solutions that serve as a comprehensive countermeasure to mitigate these threats effectively. We will text and evaluate the final solutions in our IoI-IIoT testbeds, including over 75 Internet of Things devices and equipment.<\/p>\n\n\n\n<p class=\"text-uppercase\"><\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns card-deck aspect-ratio is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column card rounded-0 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full mb-0\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"380\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/network-security.png\" alt=\"The Future of Network Security and Threat Analysis\" class=\"wp-image-647\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/network-security.png 728w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/network-security-400x209.png 400w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"card-title font-weight-bold\" style=\"font-size:22px\"> <strong>Universal Anomaly Profile (UAP) <\/strong><\/p>\n\n\n\n<p class=\"card-text\">Anomaly detection aims to find data activity patterns that do not conform to established and expected behaviours. Anomaly detection has many applications, such as detecting intrusion, fraud, data leakage, etc. The main idea in this project is to build a typical hierarchical profile for an organization\u2019s benign users, called a Universal User Profile (UUP), and a profile for users with behavioral anomalies, or \u201cbad users\u201d, a Universal Anomaly Profile (UAP). The proposed model will be called Universal Anomaly Detection (UAD) and, along with a human-centric infographic model, will contain multiple data visualization techniques to allow for improved visibility, faster troubleshooting, and streamlined onboarding. It will be developed as a new component for all available IT systems security management solutions, including Intrusion Detection and Prevention Systems (IDS\/IPS), Unified Threat Management (UTM), Security Information and Event Management (SIEM), etc.. It will be tested using our network security testbed, including 50 VMs (covering different OSs and user behaviours) and 11 servers (such as Web Server, email server, Database Server, DNS Server, File server, FTP server, DHCP server, etc.).<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column card rounded-0 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized mb-0\"><img loading=\"lazy\" decoding=\"async\" width=\"275\" height=\"183\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/08\/SmartContracts.jpg\" alt=\"Smart Contracts\" class=\"wp-image-715\" style=\"width:376px;height:auto\"\/><\/figure>\n\n\n\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"card-title font-weight-bold\" style=\"font-size:22px\"><meta charset=\"utf-8\"><strong>Smart Contracts<\/strong> <strong>Vulnerabilities<\/strong> <strong>Profiling<\/strong><\/p>\n\n\n\n<p class=\"card-text\"><meta charset=\"utf-8\">Smart Contracts are self-executing programs operating on blockchains like Ethereum, with a significant role in decentralized applications and cryptocurrency management. However, they are susceptible to attacks due to technical flaws in design and implementation. Smart Contracts enable automated and trustless agreements without intermediaries, and their immutability after deployment on the blockchain makes security considerations crucial during development. Nonetheless, recent devastating attacks and numerous vulnerabilities have raised concerns about the technology's sustainability. While Smart Contracts offer a powerful tool for developing decentralized applications, their implementation on blockchain platforms introduces security challenges stemming from programming vulnerabilities, which can lead to substantial economic consequences. This project aims to create a Universal vulnerability profiling system for Smart Contracts to address these issues.<\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns card-deck aspect-ratio is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column card rounded-0 is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full mb-0\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"594\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/01\/DeFi.jpg\" alt=\"\" class=\"wp-image-1773\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/01\/DeFi.jpg 1200w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/01\/DeFi-400x198.jpg 400w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/01\/DeFi-1024x507.jpg 1024w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"card-title font-weight-bold\" style=\"font-size:22px\"><strong>Decentralized Finance Security (DeFi Sec) <\/strong><\/p>\n\n\n\n<p class=\"card-text\">This project focuses on enhancing security in Decentralized Finance (DeFi) by addressing the unique challenges of fraudulent activities in a decentralized ecosystem. Unlike Centralized Finance (CeFi), which relies on advanced fraud detection systems incorporating AI-powered models, DeFi introduces vulnerabilities due to its pseudo-anonymous nature, smart contract flaws, and lack of regulatory oversight. These factors create new opportunities for malicious actors, necessitating innovative detection and prevention methods. The project aims to develop and implement cutting-edge solutions tailored to the DeFi landscape, ensuring robust security, safeguarding user assets, and mitigating risks associated with decentralized financial operations.<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column card rounded-0 is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group card-body\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"card-title font-weight-bold\" style=\"font-size:22px\"><\/p>\n\n\n\n<p class=\"card-text\"><\/p>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:73%\">\n<h2 class=\"wp-block-heading\">Partners and Collaborators:<\/h2>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"350\" height=\"120\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/05\/IFE.png\" alt=\"\" class=\"wp-image-2294\" style=\"width:300px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"119\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/Dalhousie.png\" alt=\"\" class=\"wp-image-3319\" style=\"width:297px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/Dalhousie.png 425w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/Dalhousie-400x112.png 400w\" sizes=\"auto, (max-width: 425px) 100vw, 425px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"494\" height=\"139\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/03\/Eureka-logo.jpg\" alt=\"\" class=\"wp-image-1954\" style=\"width:300px\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/03\/Eureka-logo.jpg 494w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/03\/Eureka-logo-400x113.jpg 400w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"94\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/05\/NR-1.png\" alt=\"\" class=\"wp-image-2296\" style=\"width:273px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"135\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/05\/MU.png\" alt=\"\" class=\"wp-image-2246\" style=\"width:300px\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"139\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/05\/UPM.png\" alt=\"\" class=\"wp-image-2247\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"782\" height=\"300\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/08\/cPacket_logo_horizontal-1.png\" alt=\"\" class=\"wp-image-713\" style=\"width:300px\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/08\/cPacket_logo_horizontal-1.png 782w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/08\/cPacket_logo_horizontal-1-400x153.png 400w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"398\" height=\"127\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/09\/NICT.png\" alt=\"\" class=\"wp-image-1392\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:73%\">\n<h2 class=\"wp-block-heading\">Research Funding and Institutional Support<\/h2>\n\n\n\n<p>We acknowledge the support of the <a href=\"https:\/\/www.innovation.ca\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Canada<\/em>&nbsp;Foundation for Innovation (<em>CFI<\/em>)<\/a> (JELF and IoF) and the <a href=\"https:\/\/www.ontario.ca\/page\/ontario-research-fund-research-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">Ontario Research Fund (ORF)<\/a> for the infrastructure funds.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"130\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/02\/CANSSI-Ontario.png\" alt=\"\" class=\"wp-image-3460\" style=\"width:139px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"170\" height=\"75\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2026\/03\/PS.png\" alt=\"\" class=\"wp-image-3476\" style=\"width:214px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"356\" height=\"86\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/HKNorway.png\" alt=\"\" class=\"wp-image-3325\" style=\"width:268px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"282\" height=\"150\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/RCNorway.png\" alt=\"\" class=\"wp-image-3323\" style=\"width:202px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"343\" height=\"147\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/NSERC.png\" alt=\"\" class=\"wp-image-3333\" style=\"width:273px;height:auto\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/NCC.png\" alt=\"\" class=\"wp-image-3321\" style=\"width:164px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/NCC.png 225w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2025\/10\/NCC-150x150.png 150w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"420\" height=\"119\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/09\/CFI.png\" alt=\"\" class=\"wp-image-1394\" style=\"width:300px\" srcset=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/09\/CFI.png 420w, https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/09\/CFI-400x113.png 400w\" sizes=\"auto, (max-width: 420px) 100vw, 420px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"238\" height=\"100\" src=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2024\/09\/ORF-3.png\" alt=\"\" class=\"wp-image-1398\" style=\"width:217px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At ¿ì²¥ÊÓÆµ\u2019s Behaviour-Centric Cybersecurity Center (BCCC), we are advancing research and innovation in securing next-generation digital infrastructure by focusing on real-world challenges across IoT, OT, IIoT, DeFi systems, smart contracts, healthcare technologies, and beyond. As a leading center in Cyber Threat Intelligence (CTI), BCCC develops and operationalizes intelligence-driven approaches to proactively detect, analyze, and [&hellip;]<\/p>\n","protected":false},"author":1159,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"tags":[8,12,26,13,16,19],"class_list":["post-636","page","type-page","status-publish","hentry","tag-behaviour-centric-cybersecurity-center-bccc","tag-everyone","tag-projects","tag-public","tag-research","tag-ucs-technical"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Projects\/Sponsors\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)<\/title>\n<meta name=\"description\" content=\"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/research\/bccc\/projects\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Projects\/Sponsors\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"og:description\" content=\"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/projects\/\" \/>\n<meta property=\"og:site_name\" content=\"Behaviour-Centric Cybersecurity Center (BCCC)\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-06T16:42:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"321\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/\",\"name\":\"Projects\\\/Sponsors\\\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2023\\\/06\\\/CAV-02.png\",\"datePublished\":\"2023-06-07T23:48:09+00:00\",\"dateModified\":\"2026-03-06T16:42:20+00:00\",\"description\":\"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2023\\\/06\\\/CAV-02.png\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/wp-content\\\/uploads\\\/sites\\\/759\\\/2023\\\/06\\\/CAV-02.png\",\"width\":624,\"height\":321,\"caption\":\"Common Attacks in CAV Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/projects\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\\\/Sponsors\\\/Collaborators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/\",\"name\":\"Behaviour-Centric Cybersecurity Center (BCCC)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/research\\\/bccc\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Projects\/Sponsors\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)","description":"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/","og_locale":"en_US","og_type":"article","og_title":"Projects\/Sponsors\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)","og_description":"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)","og_url":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/","og_site_name":"Behaviour-Centric Cybersecurity Center (BCCC)","article_modified_time":"2026-03-06T16:42:20+00:00","og_image":[{"width":624,"height":321,"url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/","url":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/","name":"Projects\/Sponsors\/Collaborators - Behaviour-Centric Cybersecurity Center (BCCC)","isPartOf":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/#primaryimage"},"image":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png","datePublished":"2023-06-07T23:48:09+00:00","dateModified":"2026-03-06T16:42:20+00:00","description":"UCS Technical overview of Universal Data Analyzers (UDAs) and Universal Cybersecurity Datasets (UCDs)","breadcrumb":{"@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/research\/bccc\/projects\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/#primaryimage","url":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png","contentUrl":"https:\/\/www.yorku.ca\/research\/bccc\/wp-content\/uploads\/sites\/759\/2023\/06\/CAV-02.png","width":624,"height":321,"caption":"Common Attacks in CAV Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/research\/bccc\/projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/research\/bccc\/"},{"@type":"ListItem","position":2,"name":"Projects\/Sponsors\/Collaborators"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/research\/bccc\/#website","url":"https:\/\/www.yorku.ca\/research\/bccc\/","name":"Behaviour-Centric Cybersecurity Center (BCCC)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/research\/bccc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"}]}},"taxonomy_info":{"post_tag":[{"value":8,"label":"Behaviour-Centric Cybersecurity Center (BCCC)"},{"value":12,"label":"Everyone"},{"value":26,"label":"Projects"},{"value":13,"label":"Public"},{"value":16,"label":"Research"},{"value":19,"label":"UCS Technical"}]},"featured_image_src_large":false,"author_info":{"display_name":"ahabibil","author_link":"https:\/\/www.yorku.ca\/research\/bccc\/author\/ahabibil\/"},"comment_info":"","_links":{"self":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/users\/1159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/comments?post=636"}],"version-history":[{"count":56,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/636\/revisions"}],"predecessor-version":[{"id":3478,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/pages\/636\/revisions\/3478"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/media?parent=636"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/research\/bccc\/wp-json\/wp\/v2\/tags?post=636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}