Janaka Maduwantha Dias Senanayake

Janaka Maduwantha Dias Senanayake
University of Kelaniya · Faculty of Science

Doctor of Philosophy (Reading) - Robert Gordon University UK

About

19
Publications
7,806
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
203
Citations

Publications

Publications (19)
Conference Paper
Full-text available
The challenge of training AI models is heightened by the limited availability of data, particularly when public datasets are insufficient. While obtaining data from private sources may seem like a viable solution, privacy concerns often prevent data sharing. Therefore, it is essential to establish a system that effectively balances privacy concerns...
Chapter
Full-text available
The detection of malicious domains often relies on machine learning (ML), and proposals for browser-based detection of malicious domains with high throughput have been put forward in recent years. However, existing methods suffer from limited accuracy. In this paper, we present MADONNA, a novel browser-based detector for malicious domains that surp...
Chapter
Full-text available
The presence of vulnerable source code in software applications is causing significant reliability and security issues, which can be mitigated by integrating and assuring software security principles during the early stages of the development lifecycle. One promising approach to identifying vulnerabilities in source code is the use of Artificial In...
Chapter
Full-text available
Adhering to security best practices during the development of Android applications is of paramount importance due to the high prevalence of apps released without proper security measures. While automated tools can be employed to address vulnerabilities during development, they may prove to be inadequate in terms of detecting vulnerabilities. To add...
Article
Full-text available
Ensuring strict adherence to security during the phases of Android app development is essential, primarily due to the prevalent issue of apps being released without adequate security measures in place. While a few automated tools are employed to reduce potential vulnerabilities during development, their effectiveness in detecting vulnerabilities ma...
Chapter
Full-text available
During Android application development, ensuring adequate security is a crucial and intricate aspect. However, many applications are released without adequate security measures due to the lack of vulnerability identification and code verification at the initial development stages. To address this issue, machine learning models can be employed to au...
Conference Paper
Full-text available
Ensuring the security of Android applications is a vital and intricate aspect requiring careful consideration during development. Unfortunately, many apps are published without sufficient security measures, possibly due to a lack of early vulnerability identification. One possible solution is to employ machine learning models trained on a labelled...
Chapter
Full-text available
Vulnerable source code in software applications is causing paramount reliability and security issues. Software security principles should be integrated to reduce these issues at the early stages of the development lifecycle. Artificial Intelligence (AI) could be applied to detect vulnerabilities in source code. In this research, a Machine Learning...
Article
Full-text available
The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Many Android applications do not address the security aspects appropriately. This is often due to a lack of automated mechanisms to iden...
Conference Paper
Full-text available
Generation Z is the first generation of humans born with technology, and they have been widely exposed to technology from the beginning of their life span. Due to their nature, Generation Z users try to fulfil day-today activities using smartphones. Hence, their privacy-related data might be shared through the devices knowingly or unknowingly. Howe...
Conference Paper
Full-text available
The usage of Internet of Things (IoT) devices is getting unavoidable lately, from handheld devices to factory automated machines and even IoT embedded automotive ehicles. On average, 100+ devices are connected to the IoT world per second, and the volume of data generated by these devices and added to the space is just too enormous. The value of the...
Conference Paper
Full-text available
Mobile application developers sometimes might not be serious about source code security and publish apps to the marketplaces. Therefore, it is essential to have a fully automated security solutions generator to integrate security-by-design into the development practices, especially for the Android platform. This research proposes a Machine Learning...
Conference Paper
Full-text available
Identifying an appropriate target audience is essential to market a product or a service. A proper mechanism should be followed to generate these potential leads and target audiences. The majority of people who were born between 1981 and 2012 hold top positions in companies. These people are regular social media and website users, since they repres...
Conference Paper
Full-text available
Coronavirus disease was first discovered in December 2019. As of July 2021, within nineteen months since this infectious disease started, more than one hundred and eighty million cases have been reported. The incubation period of the virus, severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), can be defined as the period between exposure t...
Article
Full-text available
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones, which account for 72.2% of the total market share. Hackers try to attack smartphones with various methods such as credential theft, surveillance, and malicious advertising. Among numerous countermeasures, machine learning (ML)-based methods have pro...
Conference Paper
Full-text available
In the current healthcare system, it's a common practice to refer patients from one medical practitioner to another to complete his/her treatment procedure. This process is known as a referral. Currently in Sri Lanka due to a lack of a well-organized referral system has led to many shortcomings in the health sector. These include misplacement of re...
Conference Paper
Full-text available
Ticketing mechanism in a public transportation system is a major factor which defines the service quality of the system. Current online payment systems (credit/debit cards,PayPal etc.) are not compatible with micropayments because transaction processing company need a minimum transaction amount to make the transaction profitable for them. Therefore...
Conference Paper
Full-text available
In Sri Lanka, the land administration process has not been digitized, which has led to plenty of conflicts in determining the real ownership of lands and drastically increasing the land transaction processing time, which has resulted in many fraudulent activities concerning land management. The existing system is majorly paper-based and centralized...
Article
Full-text available
Traffic is one of the most significant problem in Sri Lanka. Valuable time can be saved if there is a proper way to predict the traffic and recommend the best route considering the time factor and the people’s satisfaction on various transportation methods. Therefore, in this research using location awareness applications installed in mobile device...

Network

Cited By