Suivre
Harsha Kalutarage
Harsha Kalutarage
School of Computing, Robert Gordon University, Aberdeen, UK
Adresse e-mail validée de rgu.ac.uk - Page d'accueil
Titre
Citée par
Citée par
Année
Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation
I Wickramasinghe, H Kalutarage
Soft Computing 25 (3), 2277-2293, 2021
1452021
A survey on wireless body area networks: Architecture, security challenges and research opportunities
MS Hajar, MO Al-Kadri, HK Kalutarage
Computers & Security 104, 102211, 2021
1212021
Android mobile malware detection using machine learning: A systematic review
J Senanayake, H Kalutarage, MO Al-Kadri
Electronics 10 (13), 1606, 2021
682021
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows
A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage
2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018
592018
AI-based Intrusion Detection Systems for In-Vehicle Networks: A Survey
S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ...
ACM Computing Surveys, 2022
522022
Android Source Code Vulnerability Detection: A Systematic Literature Review
J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras
ACM Computing Surveys (CSUR), 2022
322022
FedSim: Similarity guided model aggregation for Federated Learning
C Palihawadana, N Wiratunga, A Wijekoon, H Kalutarage
Neurocomputing 483, 432-445, 2022
312022
Towards automated Android app collusion detection
IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
CoRR, abs/1603.02308, 2016
26*2016
Keep the moving vehicle secure: Context-aware intrusion detection system for in-vehicle CAN bus security
S Rajapaksha, H Kalutarage, MO Al-Kadri, G Madzudzo, AV Petrovski
2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022
23*2022
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus
HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo
Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019
222019
Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning
HK Kalutarage, SA Shaikh, Q Zhou, AE James
2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-19, 2012
212012
Towards a knowledge-based approach for effective decision-making in railway safety
A Garcia-Perez, SA Shaikh, HK Kalutarage, M Jahantab
Journal of knowledge Management 19 (3), 641-659, 2015
202015
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks, Computers & Electrical Engineering
HK Kalutarage, SA Shaikh, IP Wickramasinghe, Q Zhou, AE James
Computers & Electrical Engineering, 2015
172015
Towards a threat assessment framework for apps collusion
HK Kalutarage, HN Nguyen, SA Shaikh
Telecommunication Systems, 1-14, 2017
162017
Developing secured android applications by mitigating code vulnerabilities with machine learning
J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
142022
Ltms: A lightweight trust management system for wireless medical sensor networks
MS Hajar, MO Al-Kadri, H Kalutarage
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
122020
Nth order binary encoding with split-protocol
BS Rawal, S Liang, S Gautam, HK Kalutarage, P Vijayakumar
International Journal of Rough Sets and Data Analysis (IJRSDA) 5 (2), 95-118, 2018
122018
A Fuzzy Multicriteria Aggregation method for Data Analytics: application to Insider Threat Monitoring
I Palomares, H Kalutarage, Y Huang, P Miller, R McCausland, ...
IFSA-SCIS 2017, 2017
112017
The disintegration protocol: An ultimate technique for cloud data security
BS Rawal, HK Kalutarage, SS Vivek, K Pandey
2016 IEEE International Conference on Smart Cloud (SmartCloud), 27-34, 2016
102016
Ai-powered vulnerability detection for secure source code development
S Rajapaksha, J Senanayake, H Kalutarage, MO Al-Kadri
International Conference on Information Technology and Communications …, 2022
92022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20