Harsha K. Kalutarage
Orcid: 0000-0001-6430-9558
According to our database1,
Harsha K. Kalutarage
authored at least 52 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things.
Int. J. Inf. Sec., August, 2024
C-NEST: Cloudlet-Based Privacy Preserving Multidimensional Data Stream Approach for Healthcare Electronics.
IEEE Trans. Consumer Electron., February, 2024
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI.
J. Inf. Secur. Appl., 2024
FedFT: Improving Communication Performance for Federated Learning with Frequency Space Transformation.
CoRR, 2024
A Survey of AI-Powered Mini-Grid Solutions for a Sustainable Future in Rural Communities.
CoRR, 2024
Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
Proceedings of the ICT Systems Security and Privacy Protection, 2024
2023
3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks.
Comput. Networks, December, 2023
ACM Comput. Surv., November, 2023
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring.
Comput. Secur., October, 2023
Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system.
J. Inf. Secur. Appl., September, 2023
ACM Comput. Surv., 2023
Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
RRP: A Reliable Reinforcement Learning Based Routing Protocol for Wireless Medical Sensor Networks.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Neurocomputing, 2022
DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
A Robust Exploration Strategy in Reinforcement Learning Based on Temporal Difference Error.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022
Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation.
Soft Comput., 2021
A survey on wireless body area networks: architecture, security challenges and research opportunities.
Comput. Secur., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the ACM Computer Science in Cars Symposium, 2019
2018
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring.
Proceedings of the Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems, 2017
2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommun. Syst., 2016
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
2015
J. Knowl. Manag., 2015
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2013
PhD thesis, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
2012
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012