Skip to main content

Research Repository

Advanced Search

Outputs (44)

Android code vulnerabilities early detection using AI-powered ACVED plugin. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. In Atluri, V. and Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII; proceedings of the 37th annual IFIP WG (International Federation for Information Processing Working Group) 11.3 Data and applications security and privacy 2023 (DBSec 2023), 19-21 July 2023, Sophia-Antipolis, France. Lecture notes in computer science (LNCS), 13942. Cham: Springer [online], pages 339-357. Available from: https://doi.org/10.1007/978-3-031-37586-6_20

During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at... Read More about Android code vulnerabilities early detection using AI-powered ACVED plugin..

AI-powered vulnerability detection for secure source code development. (2023)
Conference Proceeding
RAJAPAKSHA, S., SENANAYAKE, J., KALUTARAGE, H. and AL-KADRI, M.O. 2023. AI-powered vulnerability detection for secure source code development. In Bella, G., Doinea, M. and Janicke, H. (eds.) Innovative security solutions for information technology and communications: revised selected papers of the 15th International conference on Security for information technology and communications 2022 (SecITC 2022), 8-9 December 2022, [virtual conference]. Lecture notes in computer sciences, 13809. Cham: Springer [online], pages 275-288. Available from: https://doi.org/10.1007/978-3-031-32636-3_16

Vulnerable source code in software applications is causing paramount reliability and security issues. Software security principles should be integrated to reduce these issues at the early stages of the development lifecycle. Artificial Intelligence (... Read More about AI-powered vulnerability detection for secure source code development..

AI-based intrusion detection systems for in-vehicle networks: a survey. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A., MADZUDZO, G. and CHEAH, M. 2023. Al-based intrusion detection systems for in-vehicle networks: a survey. ACM computing survey [online], 55(11), article no. 237, pages 1-40. Available from: https://doi.org/10.1145/3570954

The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to nume... Read More about AI-based intrusion detection systems for in-vehicle networks: a survey..

DQR: a double Q learning multi agent routing protocol for wireless medical sensor network. (2023)
Conference Proceeding
HAJAR, M.S., KALUTARAGE, H. and AL-KADRI, M.O. 2023. DQR: a double Q learning multi agent routing protocol for wireless medical sensor network. In Li, F., Liang, K., Lin, Z. and Katsikas, S.K. (eds.) Security and privacy in communication networks: proceedings of the 18th EAI (European Alliance for Innovation) Security and privacy in communication networks 2022 (EAI SecureComm 2022), 17-19 October 2022, Kansas City, USA. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), 462. Cham: Springer [online], pages 611-629. Available from: https://doi.org/10.1007/978-3-031-25538-0_32

Wireless Medical Sensor Network (WMSN) offers innovative solutions in the healthcare domain. It alleviates the patients' everyday life difficulties and supports the already overloaded medical staff with continuous monitoring tools. However, widesprea... Read More about DQR: a double Q learning multi agent routing protocol for wireless medical sensor network..

Android source code vulnerability detection: a systematic literature review. (2023)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM computing surveys [online], 55(9), article 187, pages 1-37. Available from: https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not add... Read More about Android source code vulnerability detection: a systematic literature review..

RRP: a reliable reinforcement learning based routing protocol for wireless medical sensor networks. (2023)
Conference Proceeding
HAJAR, M.S., KALUTARAGE, H. and AL-KADRI, M.O. 2023. RRP: a reliable reinforcement learning based routing protocol for wireless medical sensor networks. In Proceedings of the 20th IEEE (Institute of Electrical and Electronics Engineers) Consumer communications and networking conference 2023 (CCNC 2023), 8-11 January 2023, Las Vegas, USA. Piscataway: IEEE [online], pages 781-789. Available from: https://doi.org/10.1109/CCNC51644.2023.10060225

Wireless medical sensor networks (WMSNs) offer innovative healthcare applications that improve patients' quality of life, provide timely monitoring tools for physicians, and support national healthcare systems. However, despite these benefits, widesp... Read More about RRP: a reliable reinforcement learning based routing protocol for wireless medical sensor networks..

A reliable trust-aware reinforcement learning based routing protocol for wireless medical sensor networks. (2022)
Thesis
HAJAR, M.S. 2022. A reliable trust-aware reinforcement learning based routing protocol for wireless medical sensor networks. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-1987863

Interest in the Wireless Medical Sensor Network (WMSN) is rapidly gaining attention thanks to recent advances in semiconductors and wireless communication. However, by virtue of the sensitive medical applications and the stringent resource constraint... Read More about A reliable trust-aware reinforcement learning based routing protocol for wireless medical sensor networks..

Towards a robust, effective and resource-efficient machine learning technique for IoT security monitoring. (2022)
Thesis
ZAKARIYYA, I. 2022. Towards a robust, effective and resource-efficient machine learning technique for IoT security monitoring. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-1987917

Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our everyday lives, making them a lucrative target for attackers. These devices require suitable security mechanisms that enable robust and effective detection... Read More about Towards a robust, effective and resource-efficient machine learning technique for IoT security monitoring..

Resource efficient federated deep learning for IoT security monitoring. (2022)
Conference Proceeding
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2022. Resource efficient federated deep learning for IoT security monitoring. In Li, W., Furnell, S. and Meng, W. (eds.) Attacks and defenses for the Internet-of-Things: revised selected papers from the 5th International workshop on Attacks and defenses for Internet-of-Things 2022 (ADIoT 2022), in conjunction with 27th European symposium on research in computer security 2022 (ESORICS 2022) 29-30 Septempber 2022, Copenhagen, Denmark. Lecture notes in computer science (LNCS), 13745. Cham: Springer [online], pages 122-142. Available from: https://doi.org/10.1007/978-3-031-21311-3_6

Federated Learning (FL) uses a distributed Machine Learning (ML) concept to build a global model using multiple local models trained on distributed edge devices. A disadvantage of the FL paradigm is the requirement of many communication rounds before... Read More about Resource efficient federated deep learning for IoT security monitoring..

A robust exploration strategy in reinforcement learning based on temporal difference error. (2022)
Conference Proceeding
HAJAR, M.S., KALUTARAGE, H. and AL-KADRI, M.O. 2022. A robust exploration strategy in reinforcement learning based on temporal difference error. In Aziz, H., Corrêa, D. and French, T. (eds.) AI 2022: advances in artificial intelligence; proceedings of the 35th Australasian joint conference 2022 (AI 2022), 5-8 December 2022, Perth, Australia. Lecture notes in computer science (LNCS), 13728. Cham: Springer [online], pages 789-799. Available from: https://doi.org/10.1007/978-3-031-22695-3_55

Exploration is a critical component in reinforcement learning algorithms. Exploration exploitation trade-off is still a fundamental dilemma in reinforcement learning. The learning agent needs to learn how to deal with a stochastic environment in orde... Read More about A robust exploration strategy in reinforcement learning based on temporal difference error..