Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation I Wickramasinghe, H Kalutarage Soft Computing 25 (3), 2277-2293, 2021 | 186 | 2021 |
A survey on wireless body area networks: Architecture, security challenges and research opportunities MS Hajar, MO Al-Kadri, HK Kalutarage Computers & Security 104, 102211, 2021 | 139 | 2021 |
Android mobile malware detection using machine learning: A systematic review J Senanayake, H Kalutarage, MO Al-Kadri Electronics 10 (13), 1606, 2021 | 84 | 2021 |
AI-based Intrusion Detection Systems for In-Vehicle Networks: A Survey S Rajapaksha, H Kalutarage, MO Al-Kadri, A Petrovski, G Madzudzo, ... ACM Computing Surveys, 2022 | 71 | 2022 |
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage 2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018 | 68 | 2018 |
Android Source Code Vulnerability Detection: A Systematic Literature Review J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras ACM Computing Surveys (CSUR), 2022 | 38 | 2022 |
Fedsim: Similarity guided model aggregation for federated learning C Palihawadana, N Wiratunga, A Wijekoon, H Kalutarage Neurocomputing 483, 432-445, 2022 | 37 | 2022 |
Keep the moving vehicle secure: Context-aware intrusion detection system for in-vehicle CAN bus security S Rajapaksha, H Kalutarage, MO Al-Kadri, G Madzudzo, AV Petrovski 2022 14th International Conference on Cyber Conflict: Keep Moving!(CyCon …, 2022 | 31* | 2022 |
Context-aware anomaly detector for monitoring cyber attacks on automotive CAN bus HK Kalutarage, MO Al-Kadri, M Cheah, G Madzudzo Proceedings of the 3rd ACM Computer Science in Cars Symposium, 1-8, 2019 | 27 | 2019 |
Towards automated Android app collusion detection IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ... CoRR, abs/1603.02308, 2016 | 26* | 2016 |
Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning HK Kalutarage, SA Shaikh, Q Zhou, AE James 2012 4th International Conference on Cyber Conflict (CYCON 2012), 1-19, 2012 | 21 | 2012 |
Towards a knowledge-based approach for effective decision-making in railway safety A Garcia-Perez, SA Shaikh, HK Kalutarage, M Jahantab Journal of knowledge Management 19 (3), 641-659, 2015 | 20 | 2015 |
Towards a threat assessment framework for apps collusion HK Kalutarage, HN Nguyen, SA Shaikh Telecommunication Systems, 1-14, 2017 | 18 | 2017 |
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks, Computers & Electrical Engineering HK Kalutarage, SA Shaikh, IP Wickramasinghe, Q Zhou, AE James Computers & Electrical Engineering, 2015 | 17 | 2015 |
Nth order binary encoding with split-protocol BS Rawal, S Liang, S Gautam, HK Kalutarage, P Vijayakumar International Journal of Rough Sets and Data Analysis (IJRSDA) 5 (2), 95-118, 2018 | 15 | 2018 |
Developing secured android applications by mitigating code vulnerabilities with machine learning J Senanayake, H Kalutarage, MO Al-Kadri, A Petrovski, L Piras Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 14 | 2022 |
Ltms: A lightweight trust management system for wireless medical sensor networks MS Hajar, MO Al-Kadri, H Kalutarage 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 13 | 2020 |
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring I Zakariyya, H Kalutarage, MO Al-Kadri Computers & Security 133, 103388, 2023 | 12 | 2023 |
A Fuzzy Multicriteria Aggregation method for Data Analytics: application to Insider Threat Monitoring I Palomares, H Kalutarage, Y Huang, P Miller, R McCausland, ... IFSA-SCIS 2017, 2017 | 12 | 2017 |
Resource efficient boosting method for IoT security monitoring I Zakariyya, MO Al-Kadri, H Kalutarage 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC …, 2021 | 11 | 2021 |