Harsha K. Kalutarage

Orcid: 0000-0001-6430-9558

According to our database1, Harsha K. Kalutarage authored at least 52 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things.
Int. J. Inf. Sec., August, 2024

C-NEST: Cloudlet-Based Privacy Preserving Multidimensional Data Stream Approach for Healthcare Electronics.
IEEE Trans. Consumer Electron., February, 2024

Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI.
J. Inf. Secur. Appl., 2024

FedFT: Improving Communication Performance for Federated Learning with Frequency Space Transformation.
CoRR, 2024

A Survey of AI-Powered Mini-Grid Solutions for a Sustainable Future in Rural Communities.
CoRR, 2024

Cross-Validation for Detecting Label Poisoning Attacks: A Study on Random Forest Algorithm.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

2023
3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks.
Comput. Networks, December, 2023

AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey.
ACM Comput. Surv., November, 2023

Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring.
Comput. Secur., October, 2023

Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system.
J. Inf. Secur. Appl., September, 2023

Android Source Code Vulnerability Detection: A Systematic Literature Review.
ACM Comput. Surv., 2023

Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

RRP: A Reliable Reinforcement Learning Based Routing Protocol for Wireless Medical Sensor Networks.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
FedSim: Similarity guided model aggregation for Federated Learning.
Neurocomputing, 2022

DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network.
Proceedings of the Security and Privacy in Communication Networks, 2022

AI-Powered Vulnerability Detection for Secure Source Code Development.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

Robust, Effective and Resource Efficient Deep Neural Network for Intrusion Detection in IoT Networks.
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022

A Robust Exploration Strategy in Reinforcement Learning Based on Temporal Difference Error.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Resource Efficient Federated Deep Learning for IoT Security Monitoring.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Naive Bayes: applications, variations and vulnerabilities: a review of literature with code snippets for implementation.
Soft Comput., 2021

A survey on wireless body area networks: architecture, security challenges and research opportunities.
Comput. Secur., 2021

TrustMod: A Trust Management Module For NS-3 Simulator.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Improving Intrusion Detection Through Training Data Augmentation.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Resource Efficient Boosting Method for IoT Security Monitoring.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

ETAREE: An Effective Trend-Aware Reputation Evaluation Engine for Wireless Medical Sensor Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Anomaly Detection in Network Traffic Using Dynamic Graph Mining with a Sparse Autoencoder.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System Algorithm.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Context-aware Anomaly Detector for Monitoring Cyber Attacks on Automotive CAN Bus.
Proceedings of the ACM Computer Science in Cars Symposium, 2019

2018
Nth Order Binary Encoding with Split-Protocol.
Int. J. Rough Sets Data Anal., 2018

Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Towards a threat assessment framework for apps collusion.
Telecommun. Syst., 2017

A fuzzy multicriteria aggregation method for data analytics: Application to insider threat monitoring.
Proceedings of the Joint 17th World Congress of International Fuzzy Systems Association and 9th International Conference on Soft Computing and Intelligent Systems, 2017

2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommun. Syst., 2016

The Disintegration Protocol: An Ultimate Technique for Cloud Data Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
Towards a knowledge-based approach for effective decision-making in railway safety.
J. Knowl. Manag., 2015

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015

Early Warning Systems for Cyber Defence.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

Towards an Early Warning System for Network Attacks Using Bayesian Inference.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Effective monitoring of slow suspicious activites on computer networks.
PhD thesis, 2013

Tracing Sources of Anonymous Slow Suspicious Activities.
Proceedings of the Network and System Security - 7th International Conference, 2013

Monitoring for Slow Suspicious Activities Using a Target Centric Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
A Certification Process for Android Applications.
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012

Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012


  Loading...