Harsha K. Kalutarage

According to our database1, Harsha K. Kalutarage authored at least 18 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus.
Proceedings of the ACM Computer Science in Cars Symposium, 2019

2018
Nth Order Binary Encoding with Split-Protocol.
IJRSDA, 2018

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Towards a threat assessment framework for apps collusion.
Telecommunication Systems, 2017

A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring.
Proceedings of the Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems, 2017

2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommunication Systems, 2016

The Disintegration Protocol: An Ultimate Technique for Cloud Data Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
Towards a knowledge-based approach for effective decision-making in railway safety.
J. Knowledge Management, 2015

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015

Early Warning Systems for Cyber Defence.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Towards an Early Warning System for Network Attacks Using Bayesian Inference.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Effective monitoring of slow suspicious activites on computer networks.
PhD thesis, 2013

Tracing Sources of Anonymous Slow Suspicious Activities.
Proceedings of the Network and System Security - 7th International Conference, 2013

Monitoring for Slow Suspicious Activities Using a Target Centric Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
A Certification Process for Android Applications.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012


  Loading...