Suvineetha Herath

According to our database1, Suvineetha Herath authored at least 5 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Safeguarding Virtual Healthcare: A Novel Attacker-Centric Model for Data Security and Privacy.
Proceedings of the International Conference on Computer and Applications, 2024

2012
e-learning of security and information assurance with sequence diagrams.
Proceedings of the Joint International Conference on Human-Centered Computer Environments, 2012

2008
An interdisciplinary accounting forensics course to improve computer science enrollments.
J. Comput. Sci. Coll., 2008

2007
Designing computer forensics courses using case studies to enhance computer security curricula.
J. Comput. Sci. Coll., 2007

Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security.
J. Comput. Sci. Coll., 2007


  Loading...