Skip to main content

Research Repository

Advanced Search

All Outputs (67)

Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. (2024)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., PIRAS, L. and AL-KADRI, M.O. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of information security and applications [online], 82, article number 103741. Available from: https://doi.org/10.1016/j.jisa.2024.103741

Ensuring strict adherence to security during the phases of Android app development is essential, primarily due to the prevalent issue of apps being released without adequate security measures in place. While a few automated tools are employed to redu... Read More about Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI..

Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. (2023)
Conference Proceeding
PETROVSKI, A., ARIFEEN, M. and PETROVSKI, S. 2023. Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. In Kovalev, S., Kotenko, I. and Sukhanov, A. (eds.) Proceedings of the 7th Intelligent information technologies for industry international scientific conference 2023 (IITI'23), 20-25 September 2023, St. Petersburg, Russia, volume 1. Lecture notes in networks and systems (LNNS), 776. Cham: Springer [online], pages 86-95. Available from: https://doi.org/10.1007/978-3-031-43789-2_8

The penicillin fermentation process is a fed-batch system to generate industrial-scale penicillin for antibiotic production. Any fault in the fermentation tank can lead to low-quality penicillin products, which may cause a severe impact on final anti... Read More about Gated recurrent unit autoencoder for fault detection in penicillin fermentation process..

Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and MADZUDZO, G. 2023. Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. Journal of information security and applications [online], 77, article number 103570. Available from: https://doi.org/10.1016/j.jisa.2023.103570

Modern automobiles are equipped with a large number of electronic control units (ECUs) to provide safe driver assistance and comfortable services. The controller area network (CAN) provides near real-time data transmission between ECUs with adequate... Read More about Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. In De Capitani di Vimercati, S. and Samarati, P. (eds.) Proceedings of the 20th International conference on security and cryptography, 10-12 July 2023, Rome, Italy, volume 1. Setúbal: SciTePress [online], pages 659-666. Available from: https://doi.org/10.5220/0012060400003555

Ensuring the security of Android applications is a vital and intricate aspect requiring careful consideration during development. Unfortunately, many apps are published without sufficient security measures, possibly due to a lack of early vulnerabili... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models..

Android code vulnerabilities early detection using AI-powered ACVED plugin. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. In Atluri, V. and Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII; proceedings of the 37th annual IFIP WG (International Federation for Information Processing Working Group) 11.3 Data and applications security and privacy 2023 (DBSec 2023), 19-21 July 2023, Sophia-Antipolis, France. Lecture notes in computer science (LNCS), 13942. Cham: Springer [online], pages 339-357. Available from: https://doi.org/10.1007/978-3-031-37586-6_20

During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at... Read More about Android code vulnerabilities early detection using AI-powered ACVED plugin..

A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. (2023)
Journal Article
BANDA, T.M., ZĂVOIANU, A.-C., PETROVSKI, A., WÖCKINGER, D. and BRAMERDORFER, G. 2024. A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines. ACM transactions on evolutionary learning and optimization [online], 4(1), article number 3. Available from: https://doi.org/10.1145/3597618

Modelling and controlling heat transfer in rotating electrical machines is very important as it enables the design of assemblies (e.g., motors) that are efficient and durable under multiple operational scenarios. To address the challenge of deriving... Read More about A multi-objective evolutionary approach to discover explainability trade-offs when using linear regression to effectively model the dynamic thermal behaviour of electrical machines..

CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. (2023)
Journal Article
LI, Y., REN, J., YAN, Y., LIU, Q., MA, P., PETROVSKI, A. and SUN, H. 2023. CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing. IEEE transactions on geoscience and remote sensing [online], 61, 5513011. Available from: https://doi.org/10.1109/TGRS.2023.3276589

As a fundamental task in remote sensing observation of the earth, change detection using hyperspectral images (HSI) features high accuracy due to the combination of the rich spectral and spatial information, especially for identifying land-cover vari... Read More about CBANet: an end-to-end cross band 2-D attention network for hyperspectral change detection in remote sensing..

Advanced persistent threats detection based on deep learning approach. (2023)
Conference Proceeding
EKE, H.N. and PETROVSKI, A. 2023. Advanced persistent threats detection based on deep learning approach. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber physical systems international conference 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], pages 1-10. Available from: https://doi.org/10.1109/ICPS58381.2023.10128062

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach netw... Read More about Advanced persistent threats detection based on deep learning approach..

Ensemble common features technique for lightweight intrusion detection in industrial control system. (2023)
Conference Proceeding
OTOKWALA, U.J. and PETROVSKI, A. 2023. Ensemble common features technique for lightweight intrusion detection in industrial control system. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128040. Available from: https://doi.org/10.1109/icps58381.2023.10128040

The integration of the Industrial Control System (ICS) with corporate intranets and the internet has exposed the previously isolated SCADA system to a wide range of cyber-attacks. Interestingly, the vulnerabilities in the Modbus protocol, with which... Read More about Ensemble common features technique for lightweight intrusion detection in industrial control system..

Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. (2023)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2023. Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128064. Available from: https://doi.org/10.1109/icps58381.2023.10128064

Smart packaging machines incorporate various components (blades, motors, films) to accomplish the packaging process and are involved in almost all types of the manufacturing industry. Proper maintenance and monitoring of the components over time can... Read More about Bayesian optimized autoencoder for predictive maintenance of smart packaging machines..

AI-based intrusion detection systems for in-vehicle networks: a survey. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A., MADZUDZO, G. and CHEAH, M. 2023. Al-based intrusion detection systems for in-vehicle networks: a survey. ACM computing survey [online], 55(11), article no. 237, pages 1-40. Available from: https://doi.org/10.1145/3570954

The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to nume... Read More about AI-based intrusion detection systems for in-vehicle networks: a survey..

Android source code vulnerability detection: a systematic literature review. (2023)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM computing surveys [online], 55(9), article 187, pages 1-37. Available from: https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not add... Read More about Android source code vulnerability detection: a systematic literature review..

Topology for preserving feature correlation in tabular synthetic data. (2022)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2022. Topology for preserving feature correlation in tabular synthetic data. In Proceedings of the 15th IEEE (Institute of Electrical and Electronics Engineers) International conference on security of information and networks 2022 (SINCONF 2022), 11-13 November 2022, Sousse, Tunisia. Piscataway: IEEE [online], pages 61-66. Available from: https://doi.org/10.1109/SIN56466.2022.9970505

Tabular synthetic data generating models based on Generative Adversarial Network (GAN) show significant contributions to enhancing the performance of deep learning models by providing a sufficient amount of training data. However, the existing GAN-ba... Read More about Topology for preserving feature correlation in tabular synthetic data..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. [Dataset] (2022)
Dataset
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models [Dataset]. Hosted on GitHub (online). Available from: https://github.com/softwaresec-labs/LVDAndro

Many of the Android apps get published without appropriate security considerations, possibly due to not verifying code or not identifying vulnerabilities at the early stages of development. This can be overcome by using an AI based model trained on a... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. [Dataset].

Framework for detecting APTs based on steps analysis and correlation. (2022)
Book Chapter
EKE, H.N., PETROVSKI, A., AHRIZ, H. and AL-KADRI, M.O. 2022. Framework for detecting APTs based on steps analysis and correlation. In Abbaszadeh, M. and Zemouche, A. (eds.) Security and resilience in cyber-physical systems: detection, estimation and control. Cham: Springer [online], chapter 6, pages 119-147. Available from: https://doi.org/10.1007/978-3-030-97166-3_6

An advanced persistent threatAdvanced persistent threat, (APTAPT), is an attack that uses multiple attack behavior to penetrate a system, achieve specifically targeted and highly valuable goals within a system. This type of attack has presented an in... Read More about Framework for detecting APTs based on steps analysis and correlation..

Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. (2022)
Conference Proceeding
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., MADZUDZO, G. and PETROVSKI, A.V. 2022. Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. In Jančárková, T., Visky, G. and Winther, I. (eds.). Proceedings of 14th International conference on Cyber conflict 2022 (CyCon 2022): keep moving, 31 May - 3 June 2022, Tallinn, Estonia. Tallinn: CCDCOE, pages 309-330. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.23919/CyCon55549.2022.9811048

The growth of information technologies has driven the development of the transportation sector, including connected and autonomous vehicles. Due to its communication capabilities, the controller area network (CAN) is the most widely used in-vehicle c... Read More about Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security..

Developing secured android applications by mitigating code vulnerabilities with machine learning. (2022)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2022. Developing secured android applications by mitigating code vulnerabilities with machine learning. In ASIA CCS '22: proceedings of the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIA CCS 2022), 30 May - 3 June 2022, Nagasaki, Japan. New York: ACM [online], pages 1255-1257. Available from: https://doi.org/10.1145/3488932.3527290

Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the d... Read More about Developing secured android applications by mitigating code vulnerabilities with machine learning..

Comparative study of malware detection techniques for industrial control systems. (2021)
Conference Proceeding
REID, D., HARRIS, I. and PETROVSKI, A. 2021. Comparative study of malware detection techniques for industrial control systems. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 19. Available from: https://doi.org/10.1109/SIN54109.2021.9699167

Industrial Control Systems are essential to managing national critical infrastructure, yet the security of these systems historically relies on isolation. The adoption of modern software solutions, and the unique challenges presented by legacy system... Read More about Comparative study of malware detection techniques for industrial control systems..

Improving intrusion detection through training data augmentation. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Improving intrusion detection through training data augmentation. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 17. Available from: https://doi.org/10.1109/SIN54109.2021.9699293

Imbalanced classes in datasets are common problems often found in security data. Therefore, several strategies like class resampling and cost-sensitive training have been proposed to address it. In this paper, we propose a data augmentation strategy... Read More about Improving intrusion detection through training data augmentation..

Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT). (2021)
Conference Proceeding
ARIFEEN, M., PETROVSKI, A. and PETROVSKI, S. 2021. Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIot). In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 28. Available from: https://doi.org/10.1109/SIN54109.2021.9699232

The integration of the IoT network with the Operational Technology (OT) network is increasing rapidly. However, this incorporation of IoT devices into the OT network makes the industrial control system vulnerable to various cyber threats. Hacking an... Read More about Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)..