Dinesha Ranathunga

Orcid: 0000-0002-8665-371X

According to our database1, Dinesha Ranathunga authored at least 17 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Verifiable Policy-Defined Networking Using Metagraphs.
IEEE Trans. Dependable Secur. Comput., 2022

Verifying and Monitoring IoTs Network Behavior Using MUD Profiles.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Mathematical Reconciliation of Medical Privacy Policies.
ACM Trans. Manag. Inf. Syst., 2021

2019
ForestFirewalls: Getting Firewall Configuration Right in Critical Networks (Technical Report).
CoRR, 2019

Workload Models to Evaluate Heterogeneous Compute Environments Supporting Combat Systems.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019

Modelling Computational Workload in a Maritime Combat System.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019

2018
Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report).
CoRR, 2018

Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
MGtoolkit: A python package for implementing metagraphs.
SoftwareX, 2017

2016
Case Studies of SCADA Firewall Configurations and the Implications for Best Practices.
IEEE Trans. Netw. Serv. Manag., 2016

The Mathematical Foundations for Mapping Policies to Network Devices (Technical Report).
CoRR, 2016

Verifiable Policy-defined Networking for Security Management.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

The Mathematical Foundations for Mapping Policies to Network Devices.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Malachite: Firewall policy comparison.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
Towards Standardising Firewall Reporting.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015


  Loading...