Skip to main content

Research Repository

Advanced Search

All Outputs (5)

MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. (2024)
Conference Proceeding
SENANAYAKE, J., RAJAPAKSHA, S., YANAI, N., KOMIYA, C. and KALUTARAGE, H. 2024. MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis. In Meyer, N. and Grocholewska-Czuryło, A. (eds.) Revised selected papers from the proceedings of the 38th International conference on ICT systems security and privacy protection (IFIP SEC 2023), 14-16 June 2023, Poznan, Poland. IFIP advances in information and communication technology, 679. Cham: Springer [online], pages 279-292. Available from: https://doi.org/10.1007/978-3-031-56326-3_20

The detection of malicious domains often relies on machine learning (ML), and proposals for browser-based detection of malicious domains with high throughput have been put forward in recent years. However, existing methods suffer from limited accurac... Read More about MADONNA: browser-based malicious domain detection through optimized neural network with feature analysis..

FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. (2024)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., AL-KADRI, M.O. and PIRAS, L. 2024. FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 426-441. Available from: https://doi.org/10.1007/978-3-031-54129-2_25

Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabiliti... Read More about FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI..

Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. (2024)
Conference Proceeding
RAJAPAKSHA, S., SENANAYAKE, J., KALUTARAGE, H. and AL-KADRI, M.O. 2024. Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 341-356. Available from: https://doi.org/10.1007/978-3-031-54129-2_20

The presence of vulnerable source code in software applications is causing significant reliability and security issues, which can be mitigated by integrating and assuring software security principles during the early stages of the development lifecyc... Read More about Enhancing security assurance in software development: AI-based vulnerable code detection with static analysis..

Factors influencing mobile app user experience: an analysis of education app user reviews. (2024)
Conference Proceeding
ARAMBEPOLA, N., MUNASINGHE, L. and WARNAJITH, N. 2024. Factors influencing mobile app user experience: an analysis of education app user reviews. In 4th International conference on advanced research in computing 2024 (ICARC 2024), 21-24 February 2024, Belihuloya, Sri Lanka. Piscataway: IEEE [online], pages 223-228. Available from: https://doi.org/10.1109/ICARC61713.2024.10499727

In the competitive digital world, user reviews considered as the most vital source of user feedback, provide valuable insights that reflect the success of software applications in terms of user experience (UX). As user-generated content grows exponen... Read More about Factors influencing mobile app user experience: an analysis of education app user reviews..

Steps towards a philosophy of computing education. (2024)
Conference Proceeding
MCDERMOTT, R., DANIELS, M. and FREZZA, S.T. 2024. Steps towards a philosophy of computer education. In Mühling, A. and Jormanainen, I. (eds.) Proceedings of the 23rd Koli calling international conference on computing education research 2023, 13-18 November 2024, Koli, Finland. New York: ACM [online], article 20. Available from: https://doi.org/10.1145/3631802.3631817

Is it meaningful to talk about the philosophy of computing education? What is its subject matter and methods? Is it different from, or a subfield of, the philosophy of science education or the philosophy of technology education or the philosophy of e... Read More about Steps towards a philosophy of computing education..