Skip to main content

Research Repository

Advanced Search

All Outputs (50)

Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. (2022)
Conference Proceeding
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., MADZUDZO, G. and PETROVSKI, A.V. 2022. Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. In Jančárková, T., Visky, G. and Winther, I. (eds.). Proceedings of 14th International conference on Cyber conflict 2022 (CyCon 2022): keep moving, 31 May - 3 June 2022, Tallinn, Estonia. Tallinn: CCDCOE, pages 309-330. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.23919/CyCon55549.2022.9811048

The growth of information technologies has driven the development of the transportation sector, including connected and autonomous vehicles. Due to its communication capabilities, the controller area network (CAN) is the most widely used in-vehicle c... Read More about Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security..

Developing secured android applications by mitigating code vulnerabilities with machine learning. (2022)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2022. Developing secured android applications by mitigating code vulnerabilities with machine learning. In ASIA CCS '22: proceedings of the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIA CCS 2022), 30 May - 3 June 2022, Nagasaki, Japan. New York: ACM [online], pages 1255-1257. Available from: https://doi.org/10.1145/3488932.3527290

Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the d... Read More about Developing secured android applications by mitigating code vulnerabilities with machine learning..

Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. (2022)
Conference Proceeding
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2022. Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks. In CPPS '22: proceedings of the 8th ACM (Association for Computing Machinery) Cyber-physical system security workshop 2022 (CPSS '22), co-located with the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIACCS '22) Nagasaki, Japan (virtual event). New York: ACM [online], pages 41-51. Available from: https://doi.org/10.1145/3494107.3522772

Internet of Things (IoT) devices are becoming increasingly popular and an integral part of our everyday lives, making them a lucrative target for attackers. These devices require suitable security mechanisms that enable robust and effective detection... Read More about Robust, effective and resource efficient deep neural network for intrusion detection in IoT networks..

Replacing human input in spam email detection using deep learning. (2022)
Conference Proceeding
NICHO, M., MAJDANI, F. and MCDERMOTT, C.D. 2022. Replacing human input in spam email detection using deep learning. In Degen, H. and NTOA, S. (eds.) Artificial intelligence in HCI: proceedings of 3rd International conference on artificial intelligence in HCI (human-computer interaction) 2022 (AI-HCI 2022), co-located with the 24th International conference on human-computer interaction 2022 (HCI International 2022), 26 June - 1 July 2022, [virtual conference]. Lecture notes in artificial intelligence (LNAI), 13336. Cham: Springer [online], pages 387-404. Available from: https://doi.org/10.1007/978-3-031-05643-7_25

The Covid-19 pandemic has been a driving force for a substantial increase in online activity and transactions across the globe. As a consequence, cyber-attacks, particularly those leveraging email as the preferred attack vector, have also increased e... Read More about Replacing human input in spam email detection using deep learning..

Detection of image forgery for forensic analytics. (2022)
Conference Proceeding
SRI, C.G., BANO, S., TRINADH, V.B., VALLURI, V.V. and THUMATI, H. 2022. Detection of image forgery for forensic analytics. In Aurelia, S., Hiremath, S.S., Subramanian, K. and Biswas, S.K. (eds.) Select proceedings of the 2021 International conference on sustainable advanced computing (ICSAC 2021), 5-6 March 2021, Bangalore, India. Lecture notes in electrical engineering, 840. Singapore: Springer [online], pages 321-338. Available from: https://doi.org/10.1007/978-981-16-9012-9_26

Due to the technical revolution in digital image processing, different advanced image manipulation software has been used in recent years to produce new unrealistic images without leaving evidence of what is happening in the world, so it would be dif... Read More about Detection of image forgery for forensic analytics..

Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. (2022)
Conference Proceeding
CHEN, S., YAN, Y., REN, J., HWANG, B., MARSHALL, S. and DARRANI, T. 2022. Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 1004-1012. Available from: https://doi.org/10.1007/978-981-19-0390-8_126

By grouping pixels with visual coherence, superpixel algorithms provide an alternative representation of regular pixel grid for precise and efficient image segmentation. In this paper, a multi-stage model is used for sea ice segmentation from the hig... Read More about Superpixel based sea ice segmentation with high-resolution optical images: analysis and evaluation..

Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. (2022)
Conference Proceeding
YAN, Y., ZHANG, Y., REN, J., HADJAL, M., MCKEE, D., KAO, F.-J., and DURRANI, T. 2022. Estimation of chlorophyll concentration for environment monitoring in Scottish marine water. In Liang, Q., Wang, W., Liu, X., Na, Z. and Zhang, B. (eds.) Communications, signal processing and systems: proceedings of the 10th International conference on Communications, signal processing and systems 2021 (CSPS 2021), 21-22 August 2021, Baishishan, China. Lecture notes in electrical engineering, 878. Singapore: Springer [online], 1, pages 582-587. Available from: https://doi.org/10.1007/978-981-19-0390-8_71

Marine Scotland is tasked with reporting on the environmental status of Scottish marine waters, an enormous area of water extending from the shoreline to deep oceanic waters. As one of the most important variables, chlorophyll concentration (Chl) pla... Read More about Estimation of chlorophyll concentration for environment monitoring in Scottish marine water..

A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. (2022)
Conference Proceeding
ALKUBAISY, D., PIRAS, L., AL-OBEIDALLAH, M.G., COX, K. and MOURATIDIS, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. In Ali, R., Kaindl, H. and Maciaszek, L.A. (eds.). Evaluation of novel approaches to software engineering: revised selected papers from 16th International conference on Evaluation of novel approaches to software engineering 2021 (ENASE 2021), 26-27 April 2021, [virtual conference]. Communications in computer and information science, 1556. Cham: Springer [online], pages 67-87. Available from: https://doi.org/10.1007/978-3-030-96648-5_4

Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineer... Read More about A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design..

Integrated design framework for facilitating systems-theoretic process analysis. (2022)
Conference Proceeding
ALTAF, A., FAILY, S., DOGAN, H., THRON, E. and MYLONAS, A. 2022. Integrated design framework for facilitating systems-theoretic process analysis. In Katsikas, S., Lambrinoudakis, C., Cuppens, N. et al (eds.) Computer security: 26th European symposium on research in computer security (ESORICS 2021) international workshops: selected papers from 7th workshop on the security of industrial control systems of cyber-physical systems (CyberICPS 2021), co-located with SECPRE, ADIoT, SPOSE, CPS4CIP, CDT and SECOMANE, 4-8 October 2021, Darmstadt, Germany. Lecture notes in computer science (LNCS), 13106. Cham: Springer [online], pages 58-73. Available from: https://doi.org/10.1007/978-3-030-95484-0_4

Systems-Theoretic Process Analysis (STPA) helps mitigate identified safety hazards leading to unfortunate situations. Usually, a systematic step-by-step approach is followed by safety experts irrespective of any software based tool-support, but ident... Read More about Integrated design framework for facilitating systems-theoretic process analysis..

Cybersecurity user requirements analysis: the ECHO approach. (2022)
Conference Proceeding
KATOS, V., KI-ARIES, D., FAILY, S., GENCHEV, A., BOZHILOVA, M. and STOIANOV, N. 2022. Cybersecurity user requirements analysis: the ECHO approach. In: Shkarlet, S., Morozov, A., Palagin, A., Vinnikov, D., Stoianov, N., Zhelezniak, M. and Kazymyr, V. (eds.) Mathematical modeling and simulation of systems: selected papers from the proceedings of the 16th International scientific-practical conference on mathematical modeling and simulation of systems (MODS 2021), 28 June - 1 July 2021, Chernihiv, Ukraine. Lecture notes in networks and systems, 344. Cham: Springer [online], pages 405-421. Available from: https://link.springer.com/book/9783030899011

Cyber defense requires research and investment in advanced technological solution as well as in the development of effective methods and tools for identifying cyber threats and risks. This implies a need for a well-defined process for user requiremen... Read More about Cybersecurity user requirements analysis: the ECHO approach..