Skip to main content

Research Repository

Advanced Search

All Outputs (6)

Improving federated learning performance with similarity guided feature extraction and pruning. (2024)
Thesis
PALIHAWADANA, C. 2024. Improving federated learning performance with similarity guided feature extraction and pruning. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-2801100

Federated Learning (FL) is a Machine Learning (ML) paradigm that learns from distributed clients to collaboratively train a global model in a privacy-preserved manner without sharing their private data. Traditional centralised ML approaches require a... Read More about Improving federated learning performance with similarity guided feature extraction and pruning..

Enhancing Android application security through source code vulnerability mitigation using artificial intelligence: a privacy-preserved, community-driven, federated-learning-based approach. (2024)
Thesis
SENANAYAKE, J.M.D. 2024. Enhancing Android application security through source code vulnerability mitigation using artificial intelligence: a privacy-preserved, community-driven, federated-learning-based approach. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-2801183

As technology advances, Android devices and apps are rapidly increasing. It is crucial to adhere to security protocols during app development, especially as many apps lack sufficient safeguards. Despite the use of automated tools for risk mitigation,... Read More about Enhancing Android application security through source code vulnerability mitigation using artificial intelligence: a privacy-preserved, community-driven, federated-learning-based approach..

Computer security: ESORICS 2024 international workshops: revised selected papers from the proceedings of eleven international workshops held in conjunction with the 29th European Symposium on Research in Computer Security (ESORICS 2024), 16-20 September 2024, Bydgoszcz, Poland. Part II. (2024)
Presentation / Conference Contribution
GARCIA-ALFARO, J., KALUTARAGE, H., YANAI, N. et al. (eds.) Computer security: ESORICS 2024 international workshops: revised selected papers from the proceedings of eleven international workshops held in conjunction with the 29th European Symposium on Research in Computer Security (ESORICS 2024), 16-20 September 2024, Bydgoszcz, Poland. Part II. Lecture notes in computer science, 15264. Cham: Springer [online]. Available from: https://doi.org/10.1007/978-3-031-82362-6

This two-volume set LNCS 15263 and LNCS 15264 constitutes the refereed proceedings of eight International Workshops which were held in conjunction with the 29th European Symposium on Research in Computer Security, ESORICS 2024, in Bydgoszcz, Poland,... Read More about Computer security: ESORICS 2024 international workshops: revised selected papers from the proceedings of eleven international workshops held in conjunction with the 29th European Symposium on Research in Computer Security (ESORICS 2024), 16-20 September 2024, Bydgoszcz, Poland. Part II..

Protecting vehicles from cyberattacks: context aware AI-based intrusion detection for vehicle CAN bus security. (2024)
Thesis
RAJAPAKSHA, S. 2024. Protecting vehicles from cyberattacks: context aware AI-based intrusion detection for vehicle CAN bus security. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-2801124

Modern automobiles are equipped with a large number of electronic control units (ECUs), which are interconnected through the controller area network (CAN) bus for real-time data exchange. However, the CAN bus lacks security measures, rendering it sus... Read More about Protecting vehicles from cyberattacks: context aware AI-based intrusion detection for vehicle CAN bus security..

Lightweight intrusion detection of attacks on the Internet of Things (IoT) in critical infrastructures. (2024)
Thesis
OTOKWALA, U.J. 2024. Lightweight intrusion detection of attacks on the Internet of Things (IoT) in critical infrastructures. Robert Gordon University, PhD thesis. Hosted on OpenAIR [online]. Available from: https://doi.org/10.48526/rgu-wt-2571244

Critical Infrastructures (CI) are essential for various aspects of human activities, spanning across different sectors. However, the integration of Internet of Things (IoT) devices into CI has introduced a new dimension to security challenges due to... Read More about Lightweight intrusion detection of attacks on the Internet of Things (IoT) in critical infrastructures..

Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops). (2024)
Presentation / Conference Contribution
KATSIKAS, S. et al. (eds.) 2024. Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II. Available from: https://doi.org/10.1007/978-3-031-54129-2

This is the proceedings of seven of the international workshops that were held as part of the 28th edition of the European Symposium on Research in Computer Security (ESORICS).