Skip to main content

Research Repository

Advanced Search

All Outputs (14)

Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. (2024)
Journal Article
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2024 Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. International journal of information security [online], 23(4), pages 2559-2581. Available from: https://doi.org/10.1007/s10207-024-00855-7

Embedded systems, including the Internet of things (IoT), play a crucial role in the functioning of critical infrastructure. However, these devices face significant challenges such as memory footprint, technical challenges, privacy concerns, performa... Read More about Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things..

Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. (2024)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., PIRAS, L. and AL-KADRI, M.O. 2024. Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI. Journal of information security and applications [online], 82, article number 103741. Available from: https://doi.org/10.1016/j.jisa.2024.103741

Ensuring strict adherence to security during the phases of Android app development is essential, primarily due to the prevalent issue of apps being released without adequate security measures in place. While a few automated tools are employed to redu... Read More about Defendroid: real-time Android code vulnerability detection via blockchain federated neural network with XAI..

C-NEST: cloudlet based privacy preserving multidimensional data stream approach for healthcare electronics. (2023)
Journal Article
SRIVASTAVA, G., MEKALA, M.S., HAJAR, M.S. and KALUTARAGE, H. 2024. C-NEST: cloudlet based privacy preserving multidimensional data stream approach for healthcare electronics. IEEE transactions on consumer electronics [online], 70(1), pages 1556-1565. Available from: https://doi.org/10.1109/TCE.2023.3342635

The Medical Internet of Things (MIoT) facilitates extensive connections between cyber and physical "things" allowing for effective data fusion and remote patient diagnosis and monitoring. However, there is a risk of incorrect diagnosis when data is t... Read More about C-NEST: cloudlet based privacy preserving multidimensional data stream approach for healthcare electronics..

3R: a reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks. (2023)
Journal Article
HAJAR, M.S., KALUTARAGE, H.K. and AL-KADRI, M.O. 2023. 3R: a reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks. Computer networks [online], 237, article number 110073. Available from: https://doi.org/10.1016/j.comnet.2023.110073

Interest in the Wireless Medical Sensor Network (WMSN) is rapidly gaining attention thanks to recent advances in semiconductors and wireless communication. However, by virtue of the sensitive medical applications and the stringent resource constraint... Read More about 3R: a reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks..

Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and MADZUDZO, G. 2023. Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system. Journal of information security and applications [online], 77, article number 103570. Available from: https://doi.org/10.1016/j.jisa.2023.103570

Modern automobiles are equipped with a large number of electronic control units (ECUs) to provide safe driver assistance and comfortable services. The controller area network (CAN) provides near real-time data transmission between ECUs with adequate... Read More about Beyond vanilla: improved autoencoder-based ensemble in-vehicle intrusion detection system..

Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. (2023)
Journal Article
ZAKARIYYA, I., KALUTARAGE, H. and AL-KADRI, M.O. 2023. Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. Computer and security [online], 133, article 103388. Available from: https://doi.org/10.1016/j.cose.2023.103388

The application of Deep Neural Networks (DNNs) for monitoring cyberattacks in Internet of Things (IoT) systems has gained significant attention in recent years. However, achieving optimal detection performance through DNN training has posed challenge... Read More about Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring..

AI-based intrusion detection systems for in-vehicle networks: a survey. (2023)
Journal Article
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A., MADZUDZO, G. and CHEAH, M. 2023. Al-based intrusion detection systems for in-vehicle networks: a survey. ACM computing survey [online], 55(11), article no. 237, pages 1-40. Available from: https://doi.org/10.1145/3570954

The Controller Area Network (CAN) is the most widely used in-vehicle communication protocol, which still lacks the implementation of suitable security mechanisms such as message authentication and encryption. This makes the CAN bus vulnerable to nume... Read More about AI-based intrusion detection systems for in-vehicle networks: a survey..

Android source code vulnerability detection: a systematic literature review. (2023)
Journal Article
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android source code vulnerability detection: a systematic literature review. ACM computing surveys [online], 55(9), article 187, pages 1-37. Available from: https://doi.org/10.1145/3556974

The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not add... Read More about Android source code vulnerability detection: a systematic literature review..

FedSim: similarity guided model aggregation for federated learning. (2021)
Journal Article
PALIHAWADANA, C., WIRATUNGA, N., WIJEKOON, A. and KALUTARAGE, H. 2022. FedSim: similarity guided model aggregation for federated learning. Neurocomputing [online], 483: distributed machine learning, optimization and applications, pages 432-445. Available from: https://doi.org/10.1016/j.neucom.2021.08.141

Federated Learning (FL) is a distributed machine learning approach in which clients contribute to learning a global model in a privacy preserved manner. Effective aggregation of client models is essential to create a generalised global model. To what... Read More about FedSim: similarity guided model aggregation for federated learning..

Android mobile malware detection using machine learning: a systematic review. (2021)
Journal Article
SENANAYAKE, J., KALUTARAGE, H. and AL-KADRI, M.O. 2021. Android mobile malware detection using machine learning: a systematic review. Electronics [online], 10(13), article 1606. Available from: https://doi.org/10.3390/electronics10131606

With the increasing use of mobile devices, malware attacks are rising, especially on Android phones, which account for 72.2% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and... Read More about Android mobile malware detection using machine learning: a systematic review..

A survey on wireless body area networks: architecture, security challenges and research opportunities. (2021)
Journal Article
HAJAR, M.S., AL-KADRI, M.O. and KALUTARAGE, H.K. 2021. A survey on wireless body area networks: architecture, security challenges and research opportunities. Computers and security [online], 104, article ID 102211. Available from: https://doi.org/10.1016/j.cose.2021.102211

In the era of communication technologies, wireless healthcare networks enable innovative applications to enhance the quality of patients’ lives, provide useful monitoring tools for caregivers, and allows timely intervention. However, due to the sensi... Read More about A survey on wireless body area networks: architecture, security challenges and research opportunities..

Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation. (2020)
Journal Article
WICKRAMASINGHE, I. and KALUTARAGE, H. 2021. Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation. Soft computing [online], 25(3), pages 2277-2293. Available from: https://doi.org/10.1007/s00500-020-05297-6

Naïve Bayes (NB) is a well-known probabilistic classification algorithm. It is a simple but efficient algorithm with a wide variety of real-world applications, ranging from product recommendations through medical diagnosis to controlling autonomous v... Read More about Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation..

Towards a threat assessment framework for apps collusion. (2017)
Journal Article
KALUTARAGE, H.K., NGUYEN, H.N. and SHAIKH, S.A. 2017. Towards a threat assessment framework for apps collusion. Telecommunication systems [online], 66(3), pages 417-430. Available from: https://doi.org/10.1007/s11235-017-0296-1

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model of Android does not address this threat as it is rather limited... Read More about Towards a threat assessment framework for apps collusion..

Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. (2015)
Journal Article
KALUTARAGE, H.K., SHAIKH, S.A., WICKRAMASINGHE, I.P., ZHOU, Q. and JAMES, A.E. 2015. Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks. Computers and electrical engineering [online], 47, pages 327-344. Available from: https://doi.org/10.1016/j.compeleceng.2015.07.007

Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a chall... Read More about Detecting stealthy attacks: efficient monitoring of suspicious activities on computer networks..