default search action
Harsha K. Kalutarage
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage:
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things. Int. J. Inf. Sec. 23(4): 2559-2581 (2024) - [j15]Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, Luca Piras, M. Omar Al-Kadri:
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI. J. Inf. Secur. Appl. 82: 103741 (2024) - [j14]Gautam Srivastava, Mahammad Shareef Mekala, Muhammad Shadi Hajar, Harsha Kalutarage:
C-NEST: Cloudlet-Based Privacy Preserving Multidimensional Data Stream Approach for Healthcare Electronics. IEEE Trans. Consumer Electron. 70(1): 1556-1565 (2024) - [c33]Tharindu Lakshan Yasarathna, Lankeshwara Munasinghe, Harsha Kalutarage, Nhien-An Le-Khac:
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm. SEC 2024: 451-464 - [e2]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i3]Craig Pirie, Harsha Kalutarage, Muhammad Shadi Hajar, Nirmalie Wiratunga, Subodha Charles, Geeth Sandaru Madhushan, Priyantha Buddhika, Supun Wijesiriwardana, Akila Dimantha, Kithdara Hansamal, Shalitha Pathiranage:
A Survey of AI-Powered Mini-Grid Solutions for a Sustainable Future in Rural Communities. CoRR abs/2407.15865 (2024) - [i2]Chamath Palihawadana, Nirmalie Wiratunga, Anjana Wijekoon, Harsha Kalutarage:
FedFT: Improving Communication Performance for Federated Learning with Frequency Space Transformation. CoRR abs/2409.05242 (2024) - 2023
- [j13]Muhammad Shadi Hajar, Harsha Kumara Kalutarage, M. Omar Al-Kadri:
3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks. Comput. Networks 237: 110073 (2023) - [j12]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. Comput. Secur. 133: 103388 (2023) - [j11]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Luca Piras:
Android Source Code Vulnerability Detection: A Systematic Literature Review. ACM Comput. Surv. 55(9): 187:1-187:37 (2023) - [j10]Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Garikayi Madzudzo, Madeline Cheah:
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey. ACM Comput. Surv. 55(11): 237:1-237:40 (2023) - [j9]Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Garikayi Madzudzo:
Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system. J. Inf. Secur. Appl. 77: 103570 (2023) - [c32]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
RRP: A Reliable Reinforcement Learning Based Routing Protocol for Wireless Medical Sensor Networks. CCNC 2023: 781-789 - [c31]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski, Luca Piras:
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin. DBSec 2023: 339-357 - [c30]Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri:
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis. ESORICS Workshops (2) 2023: 341-356 - [c29]Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, M. Omar Al-Kadri, Luca Piras:
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI. ESORICS Workshops (2) 2023: 426-441 - [c28]Chamath Palihawadana, Nirmalie Wiratunga, Harsha Kalutarage, Anjana Wijekoon:
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation. ESORICS Workshops (2) 2023: 750-760 - [c27]Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya, Harsha Kalutarage:
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis. SEC 2023: 279-292 - [c26]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras, Andrei Petrovski:
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. SECRYPT 2023: 659-666 - 2022
- [j8]Chamath Palihawadana, Nirmalie Wiratunga, Anjana Wijekoon, Harsha K. Kalutarage:
FedSim: Similarity guided model aggregation for Federated Learning. Neurocomputing 483: 432-445 (2022) - [c25]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Resource Efficient Federated Deep Learning for IoT Security Monitoring. ADIoT 2022: 122-142 - [c24]Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei V. Petrovski, Luca Piras:
Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning. AsiaCCS 2022: 1255-1257 - [c23]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
A Robust Exploration Strategy in Reinforcement Learning Based on Temporal Difference Error. AI 2022: 789-799 - [c22]Idris Zakariyya, Harsha K. Kalutarage, M. Omar Al-Kadri:
Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks. CPSS@AsiaCCS 2022: 41-51 - [c21]Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Garikayi Madzudzo, Andrei V. Petrovski:
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. CyCom 2022: 309-330 - [c20]Sampath Rajapaksha, Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri:
AI-Powered Vulnerability Detection for Secure Source Code Development. SecITC 2022: 275-288 - [c19]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network. SecureComm 2022: 611-629 - [e1]Sadiq Sani, Harsha K. Kalutarage:
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), Cambridge, United Kingdom, December 14th, 2021. CEUR Workshop Proceedings 3125, CEUR-WS.org 2022 [contents] - 2021
- [j7]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha Kumara Kalutarage:
A survey on wireless body area networks: architecture, security challenges and research opportunities. Comput. Secur. 104: 102211 (2021) - [j6]Indika P. Wickramasinghe, Harsha K. Kalutarage:
Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation. Soft Comput. 25(3): 2277-2293 (2021) - [c18]Idris Zakariyya, M. Omar Al-Kadri, Harsha K. Kalutarage:
Resource Efficient Boosting Method for IoT Security Monitoring. CCNC 2021: 1-6 - [c17]Uneneibotejit Otokwala, Andrei Petrovski, Harsha K. Kalutarage:
Improving Intrusion Detection Through Training Data Augmentation. SIN 2021: 1-8 - [c16]Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
TrustMod: A Trust Management Module For NS-3 Simulator. TrustCom 2021: 51-60 - 2020
- [c15]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks. CNS 2020: 1-9 - [c14]Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage:
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. TrustCom 2020: 1783-1790
2010 – 2019
- 2019
- [c13]Harsha Kumara Kalutarage, M. Omar Al-Kadri, Madeline Cheah, Garikayi Madzudzo:
Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus. CSCS 2019: 7:1-7:8 - [c12]Idris Zakariyya, M. Omar Al-Kadri, Harsha K. Kalutarage, Andrei Petrovski:
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm. ICETE (2) 2019: 523-528 - [c11]Guanbo Jia, Paul Miller, Xin Hong, Harsha K. Kalutarage, Tao Ban:
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder. TrustCom/BigDataSE 2019: 458-465 - 2018
- [j5]Bharat S. Rawal, Songjie Liang, Shiva Gautam, Harsha Kumara Kalutarage, Pandi Vijayakumar:
Nth Order Binary Encoding with Split-Protocol. Int. J. Rough Sets Data Anal. 5(2): 95-118 (2018) - [c10]Andrew Tomlinson, Jeremy W. Bryans, Siraj Ahmed Shaikh, Harsha Kumara Kalutarage:
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. DSN Workshops 2018: 231-238 - 2017
- [j4]Harsha Kumara Kalutarage, Hoang Nga Nguyen, Siraj Ahmed Shaikh:
Towards a threat assessment framework for apps collusion. Telecommun. Syst. 66(3): 417-430 (2017) - [c9]Ivan Palomares, Harsha K. Kalutarage, Yan Huang, Paul Miller, Robert McCausland, Gavin McWilliams:
A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring. IFSA-SCIS 2017: 1-6 - 2016
- [j3]Siraj Ahmed Shaikh, Harsha Kumara Kalutarage:
Effective network security monitoring: from attribution to target-centric monitoring. Telecommun. Syst. 62(1): 167-178 (2016) - [c8]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. IMPS@ESSoS 2016: 29-37 - [c7]Bharat S. Rawal, Harsha K. Kalutarage, S. Sree Vivek, Kamlendu Pandey:
The Disintegration Protocol: An Ultimate Technique for Cloud Data Security. SmartCloud 2016: 27-34 - [i1]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. CoRR abs/1603.02308 (2016) - 2015
- [j2]Harsha K. Kalutarage, Siraj Ahmed Shaikh, Indika P. Wickramasinghe, Qin Zhou, Anne E. James:
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Comput. Electr. Eng. 47: 327-344 (2015) - [j1]Alexeis Garcia-Perez, Siraj Ahmed Shaikh, Harsha K. Kalutarage, Mahsa Jahantab:
Towards a knowledge-based approach for effective decision-making in railway safety. J. Knowl. Manag. 19(3): 641-659 (2015) - [c6]Harsha Kumara Kalutarage, Chonho Lee, Siraj Ahmed Shaikh, Francis Bu-Sung Lee:
Towards an Early Warning System for Network Attacks Using Bayesian Inference. CSCloud 2015: 399-404 - [c5]Harsha K. Kalutarage, Siraj Ahmed Shaikh, Bu-Sung Lee, Chonho Lee, Chai Kiat Yeo:
Early Warning Systems for Cyber Defence. iNetSeC 2015: 29-42 - 2013
- [b1]Harsha K. Kalutarage:
Effective monitoring of slow suspicious activites on computer networks. Coventry University, UK, 2013 - [c4]Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Monitoring for Slow Suspicious Activities Using a Target Centric Approach. ICISS 2013: 163-168 - [c3]Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Tracing Sources of Anonymous Slow Suspicious Activities. NSS 2013: 122-134 - 2012
- [c2]Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning. CyCon 2012: 1-19 - [c1]Harsha K. Kalutarage, Padmanabhan Krishnan, Siraj Ahmed Shaikh:
A Certification Process for Android Applications. SEFM Satellite Events 2012: 288-303
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint