Skip to main content

Research Repository

Advanced Search

Outputs (38)

FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. (2024)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., PETROVSKI, A., AL-KADRI, M.O. and PIRAS, L. 2024. FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 426-441. Available from: https://doi.org/10.1007/978-3-031-54129-2_25

Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabiliti... Read More about FedREVAN: real-time detection of vulnerable android source code through federated neural network with XAI..

Optimising linear regression for modelling the dynamic thermal behaviour of electrical machines using NSGA-II, NSGA-III and MOEA/D. (2023)
Conference Proceeding
BANDA, T.M., ZĂVOIANU, A.-C., PETROVSKI, A., WÖCKINGER, D. and BRAMERDORFER, G. 2024. Optimising linear regression for modelling the dynamic thermal behaviour of electrical machines using NSGA-II, NSGA-III and MOEA/D. In Stratulat, S., Marin, M., Negru, V. and Zaharie, D. (eds.) Proceedings of the 25th International symposium on symbolic and numeric algorithms for scientific computing (SYNASC 2023), 11-14 September 2023, Nancy, France. Los Alamitos: IEEE Computer Society [online], pages 186-193. Available from: https://doi.org/10.1109/SYNASC61333.2023.00032

For engineers to create durable and effective electrical assemblies, modelling and controlling heat transfer in rotating electrical machines (such as motors) is crucial. In this paper, we compare the performance of three multi-objective evolutionary... Read More about Optimising linear regression for modelling the dynamic thermal behaviour of electrical machines using NSGA-II, NSGA-III and MOEA/D..

Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. (2023)
Conference Proceeding
PETROVSKI, A., ARIFEEN, M. and PETROVSKI, S. 2023. Gated recurrent unit autoencoder for fault detection in penicillin fermentation process. In Kovalev, S., Kotenko, I. and Sukhanov, A. (eds.) Proceedings of the 7th Intelligent information technologies for industry international scientific conference 2023 (IITI'23), 20-25 September 2023, St. Petersburg, Russia, volume 1. Lecture notes in networks and systems (LNNS), 776. Cham: Springer [online], pages 86-95. Available from: https://doi.org/10.1007/978-3-031-43789-2_8

The penicillin fermentation process is a fed-batch system to generate industrial-scale penicillin for antibiotic production. Any fault in the fermentation tank can lead to low-quality penicillin products, which may cause a severe impact on final anti... Read More about Gated recurrent unit autoencoder for fault detection in penicillin fermentation process..

Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PIRAS, L. and PETROVSKI, A. 2023. Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models. In De Capitani di Vimercati, S. and Samarati, P. (eds.) Proceedings of the 20th International conference on security and cryptography, 10-12 July 2023, Rome, Italy, volume 1. Setúbal: SciTePress [online], pages 659-666. Available from: https://doi.org/10.5220/0012060400003555

Ensuring the security of Android applications is a vital and intricate aspect requiring careful consideration during development. Unfortunately, many apps are published without sufficient security measures, possibly due to a lack of early vulnerabili... Read More about Labelled Vulnerability Dataset on Android source code (LVDAndro) to develop AI-based code vulnerability detection models..

Android code vulnerabilities early detection using AI-powered ACVED plugin. (2023)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2023. Android code vulnerabilities early detection using AI-powered ACVED plugin. In Atluri, V. and Ferrara, A.L. (eds.) Data and applications security and privacy XXXVII; proceedings of the 37th annual IFIP WG (International Federation for Information Processing Working Group) 11.3 Data and applications security and privacy 2023 (DBSec 2023), 19-21 July 2023, Sophia-Antipolis, France. Lecture notes in computer science (LNCS), 13942. Cham: Springer [online], pages 339-357. Available from: https://doi.org/10.1007/978-3-031-37586-6_20

During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at... Read More about Android code vulnerabilities early detection using AI-powered ACVED plugin..

Advanced persistent threats detection based on deep learning approach. (2023)
Conference Proceeding
EKE, H.N. and PETROVSKI, A. 2023. Advanced persistent threats detection based on deep learning approach. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber physical systems international conference 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], pages 1-10. Available from: https://doi.org/10.1109/ICPS58381.2023.10128062

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach netw... Read More about Advanced persistent threats detection based on deep learning approach..

Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. (2023)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2023. Bayesian optimized autoencoder for predictive maintenance of smart packaging machines. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128064. Available from: https://doi.org/10.1109/icps58381.2023.10128064

Smart packaging machines incorporate various components (blades, motors, films) to accomplish the packaging process and are involved in almost all types of the manufacturing industry. Proper maintenance and monitoring of the components over time can... Read More about Bayesian optimized autoencoder for predictive maintenance of smart packaging machines..

Ensemble common features technique for lightweight intrusion detection in industrial control system. (2023)
Conference Proceeding
OTOKWALA, U.J. and PETROVSKI, A. 2023. Ensemble common features technique for lightweight intrusion detection in industrial control system. In Proceedings of the 6th IEEE (Institute of Electrical and Electronics Engineers) International conference on Industrial cyber-physical systems 2023 (ICPS 2023), 8-11 May 2023, Wuhan, China. Piscataway: IEEE [online], 10128040. Available from: https://doi.org/10.1109/icps58381.2023.10128040

The integration of the Industrial Control System (ICS) with corporate intranets and the internet has exposed the previously isolated SCADA system to a wide range of cyber-attacks. Interestingly, the vulnerabilities in the Modbus protocol, with which... Read More about Ensemble common features technique for lightweight intrusion detection in industrial control system..

Topology for preserving feature correlation in tabular synthetic data. (2022)
Conference Proceeding
ARIFEEN, M. and PETROVSKI, A. 2022. Topology for preserving feature correlation in tabular synthetic data. In Proceedings of the 15th IEEE (Institute of Electrical and Electronics Engineers) International conference on security of information and networks 2022 (SINCONF 2022), 11-13 November 2022, Sousse, Tunisia. Piscataway: IEEE [online], pages 61-66. Available from: https://doi.org/10.1109/SIN56466.2022.9970505

Tabular synthetic data generating models based on Generative Adversarial Network (GAN) show significant contributions to enhancing the performance of deep learning models by providing a sufficient amount of training data. However, the existing GAN-ba... Read More about Topology for preserving feature correlation in tabular synthetic data..

Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. (2022)
Conference Proceeding
RAJAPAKSHA, S., KALUTARAGE, H., AL-KADRI, M.O., MADZUDZO, G. and PETROVSKI, A.V. 2022. Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security. In Jančárková, T., Visky, G. and Winther, I. (eds.). Proceedings of 14th International conference on Cyber conflict 2022 (CyCon 2022): keep moving, 31 May - 3 June 2022, Tallinn, Estonia. Tallinn: CCDCOE, pages 309-330. Hosted on IEEE Xplore [online]. Available from: https://doi.org/10.23919/CyCon55549.2022.9811048

The growth of information technologies has driven the development of the transportation sector, including connected and autonomous vehicles. Due to its communication capabilities, the controller area network (CAN) is the most widely used in-vehicle c... Read More about Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security..

Developing secured android applications by mitigating code vulnerabilities with machine learning. (2022)
Conference Proceeding
SENANAYAKE, J., KALUTARAGE, H., AL-KADRI, M.O., PETROVSKI, A. and PIRAS, L. 2022. Developing secured android applications by mitigating code vulnerabilities with machine learning. In ASIA CCS '22: proceedings of the 17th ACM (Association for Computing Machinery) Asia conference on computer and communications security 2022 (ASIA CCS 2022), 30 May - 3 June 2022, Nagasaki, Japan. New York: ACM [online], pages 1255-1257. Available from: https://doi.org/10.1145/3488932.3527290

Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the d... Read More about Developing secured android applications by mitigating code vulnerabilities with machine learning..

Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT). (2021)
Conference Proceeding
ARIFEEN, M., PETROVSKI, A. and PETROVSKI, S. 2021. Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIot). In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 28. Available from: https://doi.org/10.1109/SIN54109.2021.9699232

The integration of the IoT network with the Operational Technology (OT) network is increasing rapidly. However, this incorporation of IoT devices into the OT network makes the industrial control system vulnerable to various cyber threats. Hacking an... Read More about Automated microsegmentation for lateral movement prevention in industrial Internet of Things (IIoT)..

Improving intrusion detection through training data augmentation. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Improving intrusion detection through training data augmentation. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 17. Available from: https://doi.org/10.1109/SIN54109.2021.9699293

Imbalanced classes in datasets are common problems often found in security data. Therefore, several strategies like class resampling and cost-sensitive training have been proposed to address it. In this paper, we propose a data augmentation strategy... Read More about Improving intrusion detection through training data augmentation..

Comparative study of malware detection techniques for industrial control systems. (2021)
Conference Proceeding
REID, D., HARRIS, I. and PETROVSKI, A. 2021. Comparative study of malware detection techniques for industrial control systems. In Moradpoor, N., Elçi, A. and Petrovski, A. (eds.) Proceedings of 14th International conference on Security of information and networks 2021 (SIN 2021), 15-17 December 2021, [virtual conference]. Piscataway: IEEE [online], article 19. Available from: https://doi.org/10.1109/SIN54109.2021.9699167

Industrial Control Systems are essential to managing national critical infrastructure, yet the security of these systems historically relies on isolation. The adoption of modern software solutions, and the unique challenges presented by legacy system... Read More about Comparative study of malware detection techniques for industrial control systems..

Effective detection of cyber attack in a cyber-physical power grid system. (2021)
Conference Proceeding
OTOKWALA, U., PETROVSKI, A. and KALUTARAGE, H. 2021. Effective detection of cyber attack in a cyber-physical power grid system. In Arai, K. (ed) Advances in information and communication: proceedings of Future of information and communication conference (FICC 2021), 29-30 April 2021, Vancouver, Canada. Advances in intelligent systems and computing, 1363. Cham: Springer [online], 1, pages 812-829. Available from: https://doi.org/10.1007/978-3-030-73100-7_57

Advancement in technology and the adoption of smart devices in the operation of power grid systems have made it imperative to ensure adequate protection for the cyber-physical power grid system against cyber-attacks. This is because, contemporary cyb... Read More about Effective detection of cyber attack in a cyber-physical power grid system..

Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. (2020)
Conference Proceeding
MAJDANI, F., BATIK, L., PETROVSKI, A. and PETROVSKI, S. 2020. Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 4, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433613

This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data injection cyber-attacks and the means of addressing these vulnerabilities through intelligent data analysis. Efforts are being made by multiple groups to pr... Read More about Detecting malicious signal manipulation in smart grids using intelligent analysis of contextual data..

Detection of false command and response injection attacks for cyber physical systems security and resilience. (2020)
Conference Proceeding
EKE, H., PETROVSKI, A. and AHRIZ, H. 2020. Detection of false command and response injection attacks for cyber physical systems security and resilience. In Proceedings of the 13th Security of information and networks international conference 2020 (SIN 2020), 4-7 November 2020, Merkez, Turkey. New York: ACM [online], article number 10, pages 1-8. Available from: https://doi.org/10.1145/3433174.3433615

The operational cyber-physical system (CPS) state, safety and resource availability is impacted by the safety and security measures in place. This paper focused on i) command injection (CI) attack that alters the system behaviour through injection of... Read More about Detection of false command and response injection attacks for cyber physical systems security and resilience..

Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. (2019)
Conference Proceeding
ZAKARIYYA, I., AL-KADRI, M.O., KALUTARGE, H. and PETROVSKI, A. 2019. Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm. In Obaidat, M. and Samarati, P. (eds.) Proceedings of the 16th International security and cryptography conference (SECRYPT 2019), co-located with the 16th International joint conference on e-business and telecommunications (ICETE 2019), 26-28 July 2019, Prague, Czech Republic. Setúbal, Portugal: SciTePress [online], 2, pages 523-528. Available from: https://doi.org/10.5220/0008119205230528.

Using Machine Learning (ML) for Internet of Things (IoT) security monitoring is a challenge. This is due to their resource constraint nature that limits the deployment of resource-hungry monitoring algorithms. Therefore, the aim of this paper is to i... Read More about Reducing computational cost in IoT cyber security: case study of artificial immune system algorithm..

The use of machine learning algorithms for detecting advanced persistent threats. (2019)
Conference Proceeding
EKE, H.N., PETROVSKI, A. and AHRIZ, H. 2019. The use of machine learning algorithms for detecting advanced persistent threats. In Makarevich, O., Babenko, L., Anikeev, M., Elci, A. and Shahriar, H. (eds.). Proceedings of the 12th Security of information and networks international conference 2019 (SIN 2019), 12-15 September 2019, Sochi, Russia. New York: ACM [online], article No. 5. Available from: https://doi.org/10.1145/3357613.3357618

Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. Due to their capability to navigates around defenses and to evade detection for a prolonged period of... Read More about The use of machine learning algorithms for detecting advanced persistent threats..

Overlap-based undersampling for improving imbalanced data classification. (2018)
Conference Proceeding
VUTTIPITTAYAMONGKOL, P., ELYAN, E., PETROVSKI, A. and JAYNE, C. 2018. Overlap-based undersampling for improving imbalanced data classification. In Yin, H., Camacho, D., Novais, P. and Tallón-Ballesteros, A. (eds.) Intelligent data engineering and automated learning: proceedings of the 19th International intelligent data engineering and automated learning conference (IDEAL 2018), 21-23 November 2018, Madrid, Spain. Lecture notes in computer science, 11341. Cham: Springer [online], pages 689-697. Available from: https://doi.org/10.1007/978-3-030-03493-1_72

Classification of imbalanced data remains an important field in machine learning. Several methods have been proposed to address the class imbalance problem including data resampling, adaptive learning and cost adjusting algorithms. Data resampling me... Read More about Overlap-based undersampling for improving imbalanced data classification..

Generic application of deep learning framework for real-time engineering data analysis. (2018)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and PETROVSKI, S. 2018. Generic application of deep learning framework for real-time engineering data analysis. In Proceedings of the 2018 International joint conference on neural networks (IJCNN 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article number 8489356. Available from: https://doi.org/10.1109/IJCNN.2018.8489356

The need for computer-assisted real-time anomaly detection in engineering data used for condition monitoring is apparent in various applications, including the oil and gas, automotive industries and many other engineering domains. To reduce the relia... Read More about Generic application of deep learning framework for real-time engineering data analysis..

Botnet detection in the Internet of Things using deep learning approaches. (2018)
Conference Proceeding
MCDERMOTT, C.D., MAJDANI, F. and PETROVSKI, A.V. 2018. Botnet detection in the Internet of Things using deep learning approaches. In Proceedings of the 2018 International joint conference on neural networks (IJCNN 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article number 8489489. Available from: https://doi.org/10.1109/IJCNN.2018.8489489

The recent growth of the Internet of Things (IoT) has resulted in a rise in IoT based DDoS attacks. This paper presents a solution to the detection of botnet activity within consumer IoT devices and networks. A novel application of Deep Learning is u... Read More about Botnet detection in the Internet of Things using deep learning approaches..

Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry. (2018)
Conference Proceeding
VILELA, M., OLUYEMI, G. and PETROVSKI, A. 2018. Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry. In Proceedings of the 2018 IEEE international conference on fuzzy systems (FUZZ-IEEE 2018), 8-13 July 2018, Rio de Janeiro, Brazil. Piscataway, NJ: IEEE [online], article ID 8491628. Available from: https://doi.org/10.1109/FUZZ-IEEE.2018.8491628

To manage uncertainty in reservoir development projects, the Value of Information is one of the main factors on which the decision is based to determine whether it is necessary to acquire additional data. However, subsurface data is not always precis... Read More about Fuzzy data analysis methodology for the assessment of value of information in the oil and gas industry..

Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications. (2018)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2018. Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications. In Proceedings of the 2018 IEEE international symposium on innovations in intelligent systems and applications (INISTA 2018), 3-5 July 2018, Thessaloniki, Greece. New York: IEEE [online], article ID 8466315. Available from: https://doi.org/10.1109/INISTA.2018.8466315

A multitenant cloud-application that is designed to use several components needs to implement the required degree of isolation between the components when the workload changes. The highest degree of isolation results in high resource consumption and... Read More about Evolutionary computation for optimal component deployment with multitenancy isolation in cloud-hosted applications..

Towards situational awareness of botnet activity in the Internet of Things (2018)
Conference Proceeding
MCDERMOTT, C.D., PETROVSKI, A.V. and MAJDANI, F. 2018. Towards situational awareness of botnet activity in the Internet of Things. In Proceedings of the 2018 International conference on cyber situational awareness, data analytics and assessment (Cyber SA 2018): cyber situation awareness as a tool for analysis and insight, 11-12 June 2018, Glasgow, UK. Piscataway: IEEE [online], article number 8551408. Available from: https://doi.org/10.1109/CyberSA.2018.8551408

An IoT botnet detection model is designed to detect anomalous attack traffic utilised by the mirai botnet malware. The model uses a novel application of Deep Bidirectional Long Short Term Memory based Recurrent Neural Network (BLSTMRNN), in conjuncti... Read More about Towards situational awareness of botnet activity in the Internet of Things.

Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. (2016)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKII, S. 2016. Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12 161-175. Available from: https://doi.org/10.1007/978-3-319-44188-7_12

An adaptive framework for building intelligent measurement systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making intelligent decisions related to the presence of anomalies in... Read More about Intelligent measurement in unmanned aerial cyber physical systems for traffic surveillance..

Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. (2016)
Conference Proceeding
MAJDANI, F., PETROVSKI, A. and DOOLAN, D. 2016. Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment. In Jayne, C. and Iliadis, L. (eds.) Engineering applications of neural networks: proceedings of the 17th International engineering applications of neural networks conference (EANN 2016), 2-5 September 2016, Aberdeen, UK. Communications in computer and information science, 629. Cham: Springer [online], pages 198-210. Available from: https://doi.org/10.1007/978-3-319-44188-7_15

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed and applied within the context of assuring offshore asset integrity. Adaptability is achieved through the combined use of machin... Read More about Designing a context-aware cyber physical system for smart conditional monitoring of platform equipment..

Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. (2016)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2016. Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system. In Zhang, J., Miller, J.A. and Xu, X. (eds.) Proceedings of the 13th Institute of Electrical and Electronics Engineers (IEEE) International services computing conference 2016 (SCC 2016), 27 June - 2 July 2016, San Francisco, USA. Piscataway: IEEE [online], pages 379-386. Available from: https://doi.org/10.1109/SCC.2016.56

Implementing the required degree of isolation between tenants is one of the significant challenges for deploying a multitenant application on the cloud. This paper applies COMITRE (Component-based approach to multitenancy isolation through request re... Read More about Implementing the required degree of multitenancy isolation: a case study of cloud-hosted bug tracking system..

Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). (2015)
Conference Proceeding
OCHEI, L.C., PETROVSKI, A. and BASS, J.M. 2015. Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS). In Proceedings of the 2015 International Information Society conference 2015 (i-Society 2015), 9-11 November 2015, London, UK. Piscataway: IEEE [online], pages 59-66. Available from: https://doi.org/10.1109/i-Society.2015.7366859

One of the key concerns of implementing multitenancy (i.e., serving multiple tenants with a single instance of an application) on the cloud is how to enable the required degree of isolation between tenants, so that the required performance of one ten... Read More about Evaluating degrees of tenant isolation in multitenancy patterns: a case study of cloud-hosted version control system (VCS)..

ClusterNN: a hybrid classification approach to mobile activity recognition. (2015)
Conference Proceeding
BASHIR, S., DOOLAN, D. and PETROVSKI, A. 2015. ClusterNN: a hybrid classification approach to mobile activity recognition. In Chen, L.L., Steinbauer, M., Khalil, I. and Anderst-Kotsis, G. (eds.) Proceedings of the 13th International advances in mobile computing and multimedia conference (MoMM 2015), 11-13 December 2015, Brussels, Belguim. New York: ACM [online], pages 263-267. Available from: https://doi.org/10.1145/2837126.2837140

Mobile activity recognition from sensor data is based on supervised learning algorithms. Many algorithms have been proposed for this task. One of such algorithms is the K-nearest neighbour (KNN) algorithm. However, since KNN is an instance based algo... Read More about ClusterNN: a hybrid classification approach to mobile activity recognition..

Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. (2015)
Conference Proceeding
OCHEI, L.C., BASS, J.M. and PETROVSKI, A. 2015. Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools. In Proceedings of the 2015 International conference on cloud and autonomic computing (ICCAC 2015), 21-25 September 2015, Boston, USA. Piscataway: IEEE [online], pages 101-112. Available from: https://doi.org/10.1109/ICCAC.2015.17

Multitenancy is an essential cloud computing property where a single instance of an application serves multiple tenants. Multitenancy introduces significant challenges when deploying application components to the cloud due to the demand for different... Read More about Evaluating degrees of multitenancy isolation: a case study of cloud-hosted GSD tools..

Designing a context-aware cyber physical system for detecting security threats in motor vehicles. (2015)
Conference Proceeding
PETROVSKI, A., RATTADILOK, P. and PETROVSKI, S. 2015. Designing a context-aware cyber physical system for detecting security threats in motor vehicles. In Proceedings of the 8th International conference on security of information and networks (SIN'15), 8-10 September 2015, Sochi, Russia. New York: ACM [online], pages 267-270. Available from: https://doi.org/10.1145/2799979.2800029

An adaptive multi-tiered framework, which can be utilised for designing a context-aware cyber physical system is proposed in the paper and is applied within the context of providing data availability by monitoring electromagnetic interference. The ad... Read More about Designing a context-aware cyber physical system for detecting security threats in motor vehicles..

Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence. In Proceedings of the 2014 IEEE symposium on computational intelligence in control and automation (CICA 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7013256, pages 229-236. Available from: https://doi.org/10.1109/CICA.2014.7013256

An adaptive inferential measurement framework for control and automation systems has been proposed in the paper and tested on simulated traffic surveillance data. The use of the framework enables making inferences related to the presence of anomalies... Read More about Automated inferential measurement system for traffic surveillance: enhancing situation awareness of UAVs by computational intelligence..

Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. (2014)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2014. Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence. In Proceedings of the 2014 IEEE symposium on evolving and autonomous learning systems (EALS 2014), part of the 2014 IEEE symposium series on computational intelligence (SSCI 2014), 9-12 December 2014, Orlando, USA. New York: IEEE [online], article number 7009508, pages 87-94. Available from: https://doi.org/10.1109/EALS.2014.7009508

A generic framework for evolving and autonomously controlled systems has been developed and evaluated in this paper. A three-phase approach aimed at identification, classification of anomalous data and at prediction of its consequences is applied to... Read More about Self-learning data processing framework based on computational intelligence enhancing autonomous control by machine intelligence..

Anomaly monitoring framework based on intelligent data analysis. (2013)
Conference Proceeding
RATTADILOK, P., PETROVSKI, A. and PETROVSKI, S. 2013. Anomaly monitoring framework based on intelligent data analysis. In Yin, H., Tang, K., Gao, Y., Klawonn, F., Lee, M., Weise, T., Li, B. and Yao, X. (eds.) Proceedings of the 14th International conference on intelligent data engineering and automated learning (IDEAL 2013), 20-23 October 2013, Hefei, China. Lecture notes in computer science, 8206. Berlin: Springer [online], pages 134-141. Available from: https://doi.org/10.1007/978-3-642-41278-3_17

Real-time data processing has become an increasingly important challenge as the need for faster analysis of big data widely manifests itself. In this research, several Computational Intelligence methods have been applied for identifying possible anom... Read More about Anomaly monitoring framework based on intelligent data analysis..

Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. (2013)
Conference Proceeding
RATTADILOK, P. and PETROVSKI, A. 2013. Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning. In Proceedings of the 2013 IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (CIVEMSA 2013), 15-17 July 2013, Milan, Italy. New York: IEEE [online], article number 6617402, pages 93-98. Available from: https://doi.org/10.1109/CIVEMSA.2013.6617402

The paper proposes a generic approach to building inferential measurement systems. The large amount of data needed to be acquired and processed by such systems necessitates the use of machine learning techniques. In this study, an inferential measure... Read More about Inferential measurements for situation awareness: enhancing traffic surveillance by machine learning..

Statistical optimisation and tuning of GA factors. (2005)
Conference Proceeding
PETROVSKI, A., BROWNLEE, A. and MCCALL, J. 2005. Statistical optimisation and tuning of GA factors. In Proceedings of the 2005 IEEE congress on evolutionary computation (CEC 2005), 2-5 September 2005, Edinburgh, UK. New York: IEEE [online], volume 1, article number 1554759, pages 758-764. Available from: https://doi.org/10.1109/CEC.2005.1554759

This paper presents a practical methodology of improving the efficiency of Genetic Algorithms through tuning the factors significantly affecting GA performance. This methodology is based on the methods of statistical inference and has been successful... Read More about Statistical optimisation and tuning of GA factors..

Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms. (2001)
Conference Proceeding
PETROVSKI, A. and MCCALL, J. 2001. Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms. In Zitzler, E., Thiele, L., Deb, K., Coello Coello, C.A. and Corne, D. (eds.) Proceedings of the 1st International conference on evolutionary multi-criterion optimization (EMO 2001), 7-9 March 2001, Zurich, Switzerland. Lecture notes in computer science, 1993. Berlin: Springer [online], pages 531-545. Available from: https://doi.org/10.1007/3-540-44719-9_37

The main objectives of cancer treatment in general, and of cancer chemotherapy in particular, are to eradicate the tumour and to prolong the patient survival time. Traditionally, treatments are optimised with only one objective in mind. As a result o... Read More about Multi-objective optimisation of cancer chemotherapy using evolutionary algorithms..