Collection's Items (Sorted by Submit Date in Descending order): 261 to 280 of 418
Issue Date | Title | Author(s) |
2021-12-09 | Human and Organizational Threat Profiling Using Machine Learning | Kumara, P. M. I. N; Dananjaya, K. G. S; Amarasena, N. P. N. H; Pinto, H. M. S; Yapa, K; Rupasinghe, L |
2021-12-09 | Autonomous Cyber AI for Anomaly Detection | Madhuvantha, K. A. N; Hussain, M. H; De Silva, H. W. D. T; Liyanage, U. I. D; Rupasinghe, L; Liyanapathirana, C |
2021-12-16 | “Trust Pass”-Blockchain-Based Trusted Digital Identity Platform Towards Digital Transformation | Dissanayake, K; Somarathne, P; Fernando, U; Pathmasiri, D; Liyanapathirana, C; Rupasinghe, L |
2018-12-21 | Trustworthy MANET routing ESTAODV implementation | Rupasinghe, L; Nawarathna, C; Niroshan, M. A. J; Kodithuwakku, K. A. H; Kularathna, M. A. S. H; Liyanage, S. C. G |
2019-12-05 | An Automated Tool for Memory Forensics | Murthaja, M; Sahayanathan, B; Munasinghe, A. N. T. S; Uthayakumar, D; Rupasinghe, L; Senarathne, A |
2019-12-05 | Emergency Patient Identification System | Sandamal, T; Fernando, N; Jayasinghe, I; Xavier, J; Kuruwitaarachchi, N; Rupasinghe, L |
2019-12-05 | Mobile-based Malware Detection and Classification using Ensemble Artificial Intelligence | Somasundaram, S; Kasthurirathna, D; Rupasinghe, L |
2019-12-05 | Intelligent SOC Chatbot for Security Operation Center | Perera, V. H; Senarathne, A. N; Rupasinghe, L |
2020-12-02 | Infinity yoga tutor: Yoga posture detection and correction system | Rishan, F; De Silva, B; Alawathugoda, S; Nijabdeen, S; Rupasinghe, L; Liyanapathirana, C |
2015 | Medical Negligence and Doctors Liability; A Critical Review in Present Legal Regime in Sri Lanka | Rupasinghe, P |
2016-04-29 | SDN based security solution for legislative email communications: Safe guarding communication | Rupasinghe, L; Kulatunga, K. M. D.S. B; Murray, I; Keseva, K |
2018-11-21 | Novel caching mechanism to improve performance in mobile ad-hoc networks (MANETs) | Thamalaka, J. K. R. R; Dasa, T. R. J. S; Weerasinge, M. A. D. A; Jayalal, H. D. K. M; Kuruwitaarachi, N; Rupasinghe, L |
2016-03-11 | Trustworthy provenance framework for document workflow provenance | Rupasinghe, L; Weerasena, H. H; Murray, I |
2016 | A light weight provenance aware trust negotiation algorithm for smart objects in IoT | Jayakody, A; Rupasinghe, L; Mapa, N; Disanayaka, T; Kandawala, D; Dinusha, K |
2018-12-21 | Policies Based Container Migration Using Cross-Cloud Management Platform | Janarthanan, K; Peramune, P. R. L. C; Ranaweera, A. T; Krishnamohan, T; Rupasinghe, L; Sampath, K. K; Liyanapathirana, C |
2020-12-10 | Deepfake Audio Detection: A Deep Learning Based Solution for Group Conversations | Wijethunga, R. L. M. A. P. C; Matheesha, D. M. K; Noman, A. A; De Silva, K. H. V. T. A; Tissera, M; Rupasinghe, L |
2017-01-27 | A new elliptic curve cryptographic system over the finite fields | Priyatharsan, U; Rupasinghe, L; Murray, I |
2018-10-02 | A reinforcement learning approach to enhance the trust level of MANETs | Jinarajadasa, G; Rupasinghe, L; Murray, I |
2019-12-05 | Authdna: An adaptive authentication service for any identity server | De Silva, H. L. S. R. P; Wittebron, D. C; Lahiru, A. M. R; Madumadhavi, K. L; Rupasinghe, L; Abeywardena, K. Y |
2016-12-08 | E-commerce (WEB) Application security: Defense against Reconnaissance | Perera, A. C; Kesavan, K; Bannakkotuwa, S. V; Liyanapathirana, C; Rupasinghe, L |
Collection's Items (Sorted by Submit Date in Descending order): 261 to 280 of 418