Harsha K. Kalutarage
According to our database1, Harsha K. Kalutarage authored at least 18 papers between 2012 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus.
Proceedings of the ACM Computer Science in Cars Symposium, 2019
Nth Order Binary Encoding with Split-Protocol.
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Towards a threat assessment framework for apps collusion.
Telecommunication Systems, 2017
A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring.
Proceedings of the Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems, 2017
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommunication Systems, 2016
The Disintegration Protocol: An Ultimate Technique for Cloud Data Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
Towards a knowledge-based approach for effective decision-making in railway safety.
J. Knowledge Management, 2015
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015
Early Warning Systems for Cyber Defence.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Towards an Early Warning System for Network Attacks Using Bayesian Inference.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Effective monitoring of slow suspicious activites on computer networks.
PhD thesis, 2013
Tracing Sources of Anonymous Slow Suspicious Activities.
Proceedings of the Network and System Security - 7th International Conference, 2013
Monitoring for Slow Suspicious Activities Using a Target Centric Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013
A Certification Process for Android Applications.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012