  {"id":406117,"date":"2026-04-24T15:23:25","date_gmt":"2026-04-24T19:23:25","guid":{"rendered":"https:\/\/www.yorku.ca\/yfile\/?p=406117"},"modified":"2026-04-24T15:23:28","modified_gmt":"2026-04-24T19:23:28","slug":"how-york-researchers-are-strengthening-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/","title":{"rendered":"How York researchers are strengthening cybersecurity"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">¿ì²¥ÊÓÆµ researchers are exploring how to better secure a digital world increasingly shaped by the Internet of Things (IoT) by understanding how malicious bots operate and developing stronger defences against them.<\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>IoT devices are everyday objects that connect to the internet so they can send, receive and act on data. They range from home thermostats and baby monitors to traffic sensors, medical equipment and industrial controls. Many operate quietly in the background and are rarely updated or closely monitored, making them especially attractive targets for cybercriminals.<\/p>\n\n\n\n<p>\u201cAs devices proliferate globally, so do the botnets that exploit them,\u201d says <strong>Arash Habibi Lashkari<\/strong>, a professor in the <a href=\"https:\/\/www.yorku.ca\/laps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Faculty of Liberal Arts &amp; Professional Studies<\/a> and Canada Research Chair in Behaviour\u2011Centric Cybersecurity (BCCC). Botnets are networks of compromised devices that have been quietly taken over by attackers and can be coordinated to carry out cyberattacks, often without the device owner\u2019s knowledge.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"1024\" src=\"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2023\/04\/arash-Lashkari-headshot-870x1024.jpg\" alt=\"Arash Habibi Lashkari portrait\" class=\"wp-image-332542\" style=\"aspect-ratio:0.8496199184752672;width:216px;height:auto\" srcset=\"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2023\/04\/arash-Lashkari-headshot-870x1024.jpg 870w, https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2023\/04\/arash-Lashkari-headshot-340x400.jpg 340w, https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2023\/04\/arash-Lashkari-headshot.jpg 975w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><figcaption class=\"wp-element-caption\">Arash Habibi Lashkari<\/figcaption><\/figure>\n<\/div>\n\n\n<p>While cybersecurity tools already exist to protect IoT systems, Lashkari says many struggle to keep pace with today\u2019s threat landscape. Designed for specific networks or environments, these tools are often not suited to the scale or complexity of a borderless digital world, where malicious activity moves easily across regions and frequently reuse similar behaviours in different contexts.<\/p>\n\n\n\n<p>As a result, security frameworks often rely on AI to sift through vast volumes of data and spot patterns too complex or fast\u2011moving for humans to catch. This, however, comes with a shortcoming: AI can flag suspicious activity, but without explaining how or why a particular behaviour is considered malicious.<\/p>\n\n\n\n<p>\u201cThat\u2019s the primary gap of the \u2018black box\u2019 nature of AI in cybersecurity,\u201d says Lashkari, referring to systems that can produce answers without making their reasoning visible to humans. \u201cUnderstanding these gaps is critical, because a detection system that cannot explain why it flagged a behaviour is difficult to trust.\u201d<\/p>\n\n\n\n<p>Lashkari set out to resolve that gap. He and his colleagues aimed to find a way to analyze how botnets operate and build an identification approach to act on that knowledge. In doing so, it can produce results that human analysts can interpret, trust and apply across different networks.<\/p>\n\n\n\n<p>In research now published in <em>Supercomputing<\/em>, Lashkari and his colleagues built and tested a recognition and profiling system using real\u2011world IoT network traffic. Working through BCCC, the team examined how compromised devices communicate across sustained activity, focusing on patterns that could be clearly interpreted.<\/p>\n\n\n\n<p>This allowed the researchers to move beyond individual attacks and focus on broader behavioural patterns, including whether botnets operating in different environments might still act in similar ways.<\/p>\n\n\n\n<p>Lashkari says they expected to see some similarities across botnets, but were still surprised by how consistently those patterns appeared. Even when attacks targeted different technologies or deployments, compromised devices tended to follow the same underlying behaviours, including recognizable bursts of activity. That consistency matters, he explains, because knowing how one botnet operates can help identify and defend against others, even in very different settings.<\/p>\n\n\n\n<p>Lashkari says the real importance of that finding lies in what it enables. \u201cIt suggests that a breakthrough in understanding a specific botnet profile \u2013 the recurring patterns in how compromised devices communicate and behave \u2013 can be generalized to protect critical infrastructure worldwide,\u201d he says.<\/p>\n\n\n\n<p>That potential is not theoretical. To act on it, Lashkari and his colleagues developed a system that identifies IoT botnets based on behavioural patterns observed across repeated interactions. The system flags suspicious activity while also showing which specific behaviours triggered the alert, giving security teams visibility into why a device was identified as malicious.<\/p>\n\n\n\n<p>While the system itself is presented as a research framework rather than a ready\u2011to\u2011deploy product, much of the underlying IoT data and profiling resources developed through the BCCC are publicly available, allowing other researchers to study, test and build on the approach.<\/p>\n\n\n\n<p>Lashkari says this approach is especially important because malicious cyber activity is constantly evolving. As security systems improve, attackers adapt their tactics, often reshaping malicious activity to blend in with normal internet traffic. By focusing on patterns that persist across sustained behaviour, rather than relying on fixed indicators that quickly become outdated, the behaviour\u2011based system can help security teams recognize emerging threats even as attackers change how they operate.<\/p>\n\n\n\n<p>\u201cThe hope is that this work will serve as a cornerstone for more transparent, collaborative security frameworks,\u201d Lashkari says. By promoting explainable tools and shared datasets, the team aims to shift industry practice away from simply blocking IP addresses, and toward understanding and anticipating how adversaries behave.<\/p>\n\n\n\n<p>Lashkari says that need is unlikely to fade. As attackers continue to adapt, often operating slowly or subtly to avoid detection, focusing on behavioural patterns across time may become increasingly important. In an internet\u2011connected world, he says, effective defence will depend not just on smarter identification, but on tools that help security teams know what they are dealing with.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professor Arash Habibi Lashkari is investigating how malicious bots behave on everyday devices to design countermeasures that would increase digital safety.\u00a0<\/p>\n","protected":false},"author":2293,"featured_media":406121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[11,22],"tags":[56,6,10,21,39,60,37,15,4],"yfileauthor":[204],"qualifier":[198],"yfile-author":[248],"tags-to-show":[160,147,150,154,158],"workflow":[],"class_list":["post-406117","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-news","category-research-innovation","tag-ai","tag-faculty","tag-laps","tag-research","tag-sdg-11","tag-sdg-16","tag-sdg-9","tag-sdg","tag-yfile","yfileauthor-yfilestaff","qualifier-by","yfile-author-alex-huls","tags-to-show-artificial-intelligence-ai","tags-to-show-faculty","tags-to-show-laps","tags-to-show-research","tags-to-show-sdg"],"acf":{"internal_publish_date":"20260427","original_image":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How York researchers are strengthening cybersecurity - YFile<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How York researchers are strengthening cybersecurity - YFile\" \/>\n<meta property=\"og:description\" content=\"Professor Arash Habibi Lashkari is investigating how malicious bots behave on everyday devices to design countermeasures that would increase digital safety.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"YFile\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T19:23:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T19:23:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"alexhuls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"alexhuls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/\"},\"author\":{\"name\":\"alexhuls\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#\\\/schema\\\/person\\\/f385c839cd5e89f5c32dce8c973ef2db\"},\"headline\":\"How York researchers are strengthening cybersecurity\",\"datePublished\":\"2026-04-24T19:23:25+00:00\",\"dateModified\":\"2026-04-24T19:23:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/\"},\"wordCount\":826,\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/wp-content\\\/uploads\\\/sites\\\/889\\\/2026\\\/04\\\/people-working-on-laptops-Featured-scaled.jpg\",\"keywords\":[\"Artificial Intelligence (AI)\",\"Faculty\",\"LAPS\",\"Research\",\"SDG 11\",\"SDG 16\",\"SDG 9\",\"SDGs\",\"YFile\"],\"articleSection\":[\"Latest News\",\"Research &amp; Innovation\"],\"inLanguage\":\"en-CA\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/\",\"name\":\"How York researchers are strengthening cybersecurity - YFile\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/wp-content\\\/uploads\\\/sites\\\/889\\\/2026\\\/04\\\/people-working-on-laptops-Featured-scaled.jpg\",\"datePublished\":\"2026-04-24T19:23:25+00:00\",\"dateModified\":\"2026-04-24T19:23:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#\\\/schema\\\/person\\\/f385c839cd5e89f5c32dce8c973ef2db\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/wp-content\\\/uploads\\\/sites\\\/889\\\/2026\\\/04\\\/people-working-on-laptops-Featured-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/wp-content\\\/uploads\\\/sites\\\/889\\\/2026\\\/04\\\/people-working-on-laptops-Featured-scaled.jpg\",\"width\":2560,\"height\":853,\"caption\":\"people working on laptops\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/2026\\\/04\\\/24\\\/how-york-researchers-are-strengthening-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How York researchers are strengthening cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#website\",\"url\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/\",\"name\":\"YFile\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/#\\\/schema\\\/person\\\/f385c839cd5e89f5c32dce8c973ef2db\",\"name\":\"alexhuls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g\",\"caption\":\"alexhuls\"},\"url\":\"https:\\\/\\\/www.yorku.ca\\\/yfile\\\/author\\\/alexhuls\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How York researchers are strengthening cybersecurity - YFile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How York researchers are strengthening cybersecurity - YFile","og_description":"Professor Arash Habibi Lashkari is investigating how malicious bots behave on everyday devices to design countermeasures that would increase digital safety.\u00a0","og_url":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/","og_site_name":"YFile","article_published_time":"2026-04-24T19:23:25+00:00","article_modified_time":"2026-04-24T19:23:28+00:00","og_image":[{"width":2560,"height":853,"url":"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg","type":"image\/jpeg"}],"author":"alexhuls","twitter_card":"summary_large_image","twitter_misc":{"Written by":"alexhuls","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/"},"author":{"name":"alexhuls","@id":"https:\/\/www.yorku.ca\/yfile\/#\/schema\/person\/f385c839cd5e89f5c32dce8c973ef2db"},"headline":"How York researchers are strengthening cybersecurity","datePublished":"2026-04-24T19:23:25+00:00","dateModified":"2026-04-24T19:23:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/"},"wordCount":826,"image":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg","keywords":["Artificial Intelligence (AI)","Faculty","LAPS","Research","SDG 11","SDG 16","SDG 9","SDGs","YFile"],"articleSection":["Latest News","Research &amp; Innovation"],"inLanguage":"en-CA","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/www.yorku.ca\/yfile\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/","url":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/","name":"How York researchers are strengthening cybersecurity - YFile","isPartOf":{"@id":"https:\/\/www.yorku.ca\/yfile\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg","datePublished":"2026-04-24T19:23:25+00:00","dateModified":"2026-04-24T19:23:28+00:00","author":{"@id":"https:\/\/www.yorku.ca\/yfile\/#\/schema\/person\/f385c839cd5e89f5c32dce8c973ef2db"},"breadcrumb":{"@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#primaryimage","url":"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg","contentUrl":"https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-scaled.jpg","width":2560,"height":853,"caption":"people working on laptops"},{"@type":"BreadcrumbList","@id":"https:\/\/www.yorku.ca\/yfile\/2026\/04\/24\/how-york-researchers-are-strengthening-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yorku.ca\/yfile\/"},{"@type":"ListItem","position":2,"name":"How York researchers are strengthening cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.yorku.ca\/yfile\/#website","url":"https:\/\/www.yorku.ca\/yfile\/","name":"YFile","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yorku.ca\/yfile\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.yorku.ca\/yfile\/#\/schema\/person\/f385c839cd5e89f5c32dce8c973ef2db","name":"alexhuls","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1804694f1711f5d58af38a39a871f5ca6c4021187d9305718a668a5260a5a71f?s=96&d=mm&r=g","caption":"alexhuls"},"url":"https:\/\/www.yorku.ca\/yfile\/author\/alexhuls\/"}]}},"taxonomy_info":{"category":[{"value":11,"label":"Latest News"},{"value":22,"label":"Research &amp; Innovation"}],"post_tag":[{"value":56,"label":"Artificial Intelligence (AI)"},{"value":6,"label":"Faculty"},{"value":10,"label":"LAPS"},{"value":21,"label":"Research"},{"value":39,"label":"SDG 11"},{"value":60,"label":"SDG 16"},{"value":37,"label":"SDG 9"},{"value":15,"label":"SDGs"},{"value":4,"label":"YFile"}],"yfileauthor":[{"value":204,"label":"YFile Staff"}],"qualifier":[{"value":198,"label":"By"}],"yfile-author":[{"value":248,"label":"Alex Huls"}],"tags-to-show":[{"value":160,"label":"Artificial Intelligence (AI)"},{"value":147,"label":"Faculty"},{"value":150,"label":"LAPS"},{"value":154,"label":"Research"},{"value":158,"label":"SDGs"}]},"featured_image_src_large":["https:\/\/www.yorku.ca\/yfile\/wp-content\/uploads\/sites\/889\/2026\/04\/people-working-on-laptops-Featured-1024x341.jpg",1024,341,true],"author_info":{"display_name":"alexhuls","author_link":"https:\/\/www.yorku.ca\/yfile\/author\/alexhuls\/"},"comment_info":0,"category_info":[{"term_id":11,"name":"Latest News","slug":"latest-news","term_group":0,"term_taxonomy_id":11,"taxonomy":"category","description":"","parent":0,"count":12680,"filter":"raw","cat_ID":11,"category_count":12680,"category_description":"","cat_name":"Latest News","category_nicename":"latest-news","category_parent":0},{"term_id":22,"name":"Research &amp; Innovation","slug":"research-innovation","term_group":0,"term_taxonomy_id":22,"taxonomy":"category","description":"","parent":0,"count":1340,"filter":"raw","cat_ID":22,"category_count":1340,"category_description":"","cat_name":"Research &amp; Innovation","category_nicename":"research-innovation","category_parent":0}],"tag_info":[{"term_id":56,"name":"Artificial Intelligence (AI)","slug":"ai","term_group":0,"term_taxonomy_id":56,"taxonomy":"post_tag","description":"","parent":0,"count":137,"filter":"raw"},{"term_id":6,"name":"Faculty","slug":"faculty","term_group":0,"term_taxonomy_id":6,"taxonomy":"post_tag","description":"","parent":0,"count":2014,"filter":"raw"},{"term_id":10,"name":"LAPS","slug":"laps","term_group":0,"term_taxonomy_id":10,"taxonomy":"post_tag","description":"","parent":0,"count":1295,"filter":"raw"},{"term_id":21,"name":"Research","slug":"research","term_group":0,"term_taxonomy_id":21,"taxonomy":"post_tag","description":"","parent":0,"count":2315,"filter":"raw"},{"term_id":39,"name":"SDG 11","slug":"sdg-11","term_group":0,"term_taxonomy_id":39,"taxonomy":"post_tag","description":"","parent":0,"count":194,"filter":"raw"},{"term_id":60,"name":"SDG 16","slug":"sdg-16","term_group":0,"term_taxonomy_id":60,"taxonomy":"post_tag","description":"","parent":0,"count":188,"filter":"raw"},{"term_id":37,"name":"SDG 9","slug":"sdg-9","term_group":0,"term_taxonomy_id":37,"taxonomy":"post_tag","description":"","parent":0,"count":182,"filter":"raw"},{"term_id":15,"name":"SDGs","slug":"sdg","term_group":0,"term_taxonomy_id":15,"taxonomy":"post_tag","description":"","parent":0,"count":1254,"filter":"raw"},{"term_id":4,"name":"YFile","slug":"yfile","term_group":0,"term_taxonomy_id":4,"taxonomy":"post_tag","description":"","parent":0,"count":5316,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/posts\/406117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/users\/2293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/comments?post=406117"}],"version-history":[{"count":7,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/posts\/406117\/revisions"}],"predecessor-version":[{"id":406149,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/posts\/406117\/revisions\/406149"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/media\/406121"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/media?parent=406117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/categories?post=406117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/tags?post=406117"},{"taxonomy":"yfileauthor","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/yfileauthor?post=406117"},{"taxonomy":"qualifier","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/qualifier?post=406117"},{"taxonomy":"yfile-author","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/yfile-author?post=406117"},{"taxonomy":"tags-to-show","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/tags-to-show?post=406117"},{"taxonomy":"workflow","embeddable":true,"href":"https:\/\/www.yorku.ca\/yfile\/wp-json\/wp\/v2\/workflow?post=406117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}