Skip to main content

Research Repository

Advanced Search

Outputs (44)

Strengthening student engagement: evaluating the role of the digital skills agenda in higher education. (2019)
Presentation / Conference
LAWANI, A., SINGH, A., MCNEIL, A., DURACK, B. and KALUTARAGE, H. 2019. Strengthening student engagement: evaluating the role of the digital skills agenda in higher education. Presented at the 2019 Department for the Enhancement of Learning, Teaching and Access (DELTA) learning and teaching conference (LTC 2019): learning without borders, 2 May 2019, Aberdeen, UK.

Digital technology can contribute to all three areas of the TEF: teaching quality; learning environment; and student outcomes (Davies S, Mullan and Feldman 2017). Digital skills are helpful in designing enhanced and effective learning activities (Cop... Read More about Strengthening student engagement: evaluating the role of the digital skills agenda in higher education..

Feature trade-off analysis for reconnaissance detection. (2018)
Book Chapter
KALUTARAGE, H.K. and SHAIKH, S.A. 2018. Feature trade-off analysis for reconnaissance detection. In Heard, N., Adams, N., Rubin-Delanchy, P. and Turcotte, M. (eds.) Data science for cyber security. Security science and technology, 3. London: World Scientific [online], chapter 5, pages 95-126. Available from: https://doi.org/10.1142/9781786345646_005

An effective cyber early warning system (CEWS) should pick up threat activity at an early stage, with an emphasis on establishing hypotheses and predictions as well as generating alerts on (unclassified) situations based on preliminary indications. T... Read More about Feature trade-off analysis for reconnaissance detection..

Towards a threat assessment framework for apps collusion. (2017)
Journal Article
KALUTARAGE, H.K., NGUYEN, H.N. and SHAIKH, S.A. 2017. Towards a threat assessment framework for apps collusion. Telecommunication systems [online], 66(3), pages 417-430. Available from: https://doi.org/10.1007/s11235-017-0296-1

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited... Read More about Towards a threat assessment framework for apps collusion..

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..