Publications

Journals

  • Wijayarathna, C., Arachchilage, N. A. G., (2019), "Using Cognitive Dimensions to Evaluate the Usability of Security APIs: An Empirical Investigation”, Information and Software Technology, Elsevier. [Impact Factor: 2.921] [ACPHIS/ABCD Rank - A]
  • Moustafa, N., Misra, G., and Slay, J 2018, ‘Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks.  IEEE Transactions on Sustainable Computing (Early access).
  • Moustafa, N., & Slay, J, 2018, ‘RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis’, Advances in Digital Forensics XIV, Springer, Boston, pp. 225-239.
  • Moustafa, N., & Slay, J, 2018, ‘A hybrid feature selection for network intrusion detection systems: Central points’, arXiv preprint arXiv: 1707.05505.
  • Wijayarathna, C., Arachchilage, N. A. G., (2019), "Using Cognitive Dimensions to Evaluate the Usability of Security APIs: An Empirical Investigation”, Information and Software Technology, Elsevier. [Impact Factor: 2.921] [ACPHIS/ABCD Rank - A]
  • Hameed, M. A., Arachchilage, N.A.G., (2019), "The Effect of Self-efficacy on the Adoption of Information Systems Security Innovations: A Meta-analysis Assessment", Journal of Information Security and Applications, Elsevier. [CORE Rank - B]
  • Senarath, A., Arachchilage, N. A. G., (2019), "Will they use it or not? Investigating Software Developers' intention to follow Privacy Engineering Methodologies", ACM Transactions on Privacy and Security (TOPS), ACM. [CORE/ACPHIS/ABCD Rank - A]
  • Senarath, A., Arachchilage, N. A. G., (2019), "A Data Minimization Model for Embedding Privacy into Software Systems", Computers & Security, Elsevier. [Impact Factor: 2.650] [ACPHIS/ABCD Rank - A]
  • Hameed, M. A. and Arachchilage, N. A. G., (2019), "On the Impact of Perceived Vulnerability in the Adoption of Information Systems Security Innovations" International Journal of Computer Network and Information Security (IJCNIS), Volume 11, 2019.
  • Wijayarathna, C., Arachchilage, N. A. G., (2019), "Why Johnny Can't Develop a Secure Application? A Usability Analysis of Java Secure Socket Extension API”, Computer & Security, Elsevier. [Impact Factor: 2.650] [ACPHIS/ABCD Rank - A]
  • Senarath, A., Arachchilage, N. A. G., (2018), "Understanding user privacy expectations : A software developer's perspective", Telematics and Informatics, Elsevier. [Impact Factor: 3.789] [ACPHIS/ABCD/CORE Rank - C]
  • Micallef, N. and Arachchilage, N. A. G., (2018), "Security Questions Education: Exploring Gamified Features and Functionalities", Information and Computer Security, Emerald. doi:10.1108/ICS-03-2018-0033 [ACPHIS/ABCD/CORE Rank - C]
  • Stanley Shanapinda. ‘Protecting our digital heritage in the age of cyber threats’. December 6, 2018. < https://theconversation.com/profiles/stanley-shanapinda-610761/articles>
  • Stanley Shanapinda. ‘Blocking Huawei from Australia means slower and delayed 5G – and for what?’. May 23, 2019. < https://theconversation.com/profiles/stanley-shanapinda-610761/articles>
  • Stanley Shanapinda. ‘How a cyber attack hampered Hong Kong protesters’. June 14, 2019. < https://theconversation.com/profiles/stanley-shanapinda-610761/articles>
  • Shanapinda S. Asymmetry in South Africa’s regulation of customer data protection: Unequal treatment between mobile network operators (MNOs) and over-the-top (OTT) providers. The African Journal of Information and Communication (AJIC).  1-20. 2019. 10.17159/2077-7213/2019/n23a1
  • Shanapinda S. Privacy versus the Use of Location Information for Law Enforcement and Security in Australia.  Australian Journal of Telecommunications and the Digital Economy. 6:109-140. 2018. 10.18080/ajtde.v6n4.167
  • Veeraraghavan P, Hanna D. An Intelligent Message Authentication Scheme for Emergency and Safety Related Messages in a Vehicular Network.  Scientiae Mathematicae Japonicae. 31:267-278. 2018.
  • Watters, P.A., Scolyer-Gray, P., Kayes, ASM & Morshed, J. (2019). This would work perfectly if it weren’t for all the humans: Two factor authentication in late modern societies. First Monday, 24(7) (SCIMAGO Q1 RANK).
  • Camp, L.J., Probst, C., Grobler, M., Renaud, K., Jang-Jaccard, K., Kritzinger, E., & Watters, P.A. (2019). Measuring human resilience in the face of the global epidemiology of cyber attacks. Proceedings of the 52nd Hawaii International Conference on Systems Science (HICSS), Hawaii. (CORE A RANK)
  • Azab, A., Maruatona, O. & Watters, P.A. (2019). AVOCAD: Adaptive Terrorist Comms Surveillance and Interception using Machine Learning. Proceedings of the 18thIEEE International Conference on Trust, Security and Privacy in Computing and Communications. (CORE A RANK)
  • Jeanneret, R., Spiranovic, C., Eckstein, L., McWhirter, R., Arstein-Kerslake, A., Scanlan, J., Kirkby, K., Watters, P.A. & Vickers, J. (2019). Enhancing early detection of cognitive impairment in the criminal justice system: Feasibility of a proposed method. Current Issues in Criminal Justice, 13(1), 1-15.(CORE B RANK)
  • Islam, M., Mahmood, A., Watters, P.A. & Alazab, M. (2019). Forensic detection of child exploitation material using deep learning. In M. Alazab and M. Tang (Eds) Deep Learning Applications for Cyber Security. Springer.
  • Islam, M., Watters, P.A., Mahmood, A. & Alazab, M. (2019. Toward detection of child exploitation material: A Forensic approach. In M. Alazab and M. Tang (Eds) Deep Learning Applications for Cyber Security. Springer.
  • A.S. M. Kayes, W Rahayu, T Dillon, E Chang, J Han: (2019) Context-Aware Access Control with Imprecise Context Characterization for Cloud-Based Data Resources, Future Generation Computer Systems Journal, Elsevier 93, 237-255 (Q1 journal, published).
  • A. S. M. Kayes, W Rahayu, T Dillon: (2019) Critical Situation Management Utilizing IoT-Based Data Resources Through Dynamic Contextual Role Modeling and Activation, Computing Journal, Springer 101 (7), 743–772 (WoS journal, published).
  • A. S. M. Kayes, J Han, W Rahayu, T Dillon, MS Islam, A Colman: (2018) A Policy Model and Framework for Context-Aware Access Control to Information Resources, The Computer Journal, Oxford University Press 62 (5), 670-705 (rank: A*, published).
  • A. S. M. Kayes, J Han, A Colman: (2015) OntCAAC: An Ontology-Based Approach to Context-Aware Access Control for Software Services, The Computer Journal, Oxford University Press 58 (11), 3000-3034 (rank: A*, published).
  • A.S. M. Kayes, J Han, A Colman: (2015) An Ontological Framework for Situation-Aware Access Control of Software Services, Information Systems, 53, 253-277 (rank: A*, Q1 journal, published)
  • Iqbal H. Sarker, A. S. M. Kayes, and Paul Watters: (2019) Effectiveness Analysis of Machine Learning Classification Models for Predicting Personalized Context-Aware Smartphone Usage, Journal of Big Data, Publisher - Springer (Q1 journal, in press)
  • Iqbal H. Sarker, A. S. M. Kayes, Hasan Furhad , Mohammad Mainul Islam, and Md Shohidul Islam: (2019) E-MIIM: An Ensemble Learning based Context-Aware Mobile Telephony Model for Intelligent Interruption Management, AI and Society, Publisher - Springer (WoS journal, in press)
  • Mahbub, E Pardede, A. S. M. Kayes, W Rahayu: (2019) Controlling Astroturfing on the Internet: A Survey on Detection Techniques and Research Challenges, International Journal of Web and Grid Services, Inderscience 15 (2), 139-158 (WoS journal, published) .
  • Raviteja P, Phan K, THong Y. Embedded Pilot-Aided Channel Estimation for OTFS in Delay–Doppler Channels.  IEEE Transactions on Vehicular Technology. 68:4906-4917. 2019
  • Phan K, THong Y, Viterbo E. Adaptive Resource Allocation for Secure Two-Hop Relaying Communication.  IEEE Transactions on Wireless Communications. 17:8457-8472. 2018
  • Raviteja P, Phan K, THong Y, Viterbo E. Interference cancellation and iterative detection for orthogonal time frequency space modulation.  IEEE Transactions on Wireless Communications.  17:6501-6515. 2018
  • Chowdhury, Jabed. A Survey on Blockchain-based Platforms for IoT Use-cases, The Knowledge Engineering Review.
  • Chowdhury, Jabed. Immutable Autobiography of Smart Cars Leveraging Blockchain Technology, The Knowledge Engineering Review.
  • Diro, Abebe Abeshu; Chilamkurti, Naveen; Distributed attack detection scheme using deep learning approach for Internet of Things Future Generation Computer Systems 82 761-768 2018 North-Holland
  • Shen, Bo; Chilamkurti, Naveen; Wang, Ru; Zhou, Xingshe; Wang, Shiwei; Ji, Wen; Deadline-aware rate allocation for IoT services in data center network Journal of Parallel and Distributed Computing 118 296-306 2018 Academic Press
  • Sultana, Nasrin; Chilamkurti, Naveen; Peng, Wei; Alhadad, Rabei; Survey on SDN based network intrusion detection system using machine learning approaches Peer-to-Peer Networking and Applications 12 2 493-501 2019 Springer US
  • Diro, Abebe Abeshu; Reda, Haftu Tasew; Chilamkurti, Naveen; Differential flow space allocation scheme in SDN based fog computing for IoT applications Journal of Ambient Intelligence and Humanized Computing 01-Nov 2018 Springer Berlin Heidelberg
  • Rawal, Bharat S; Vijayakumar, V; Manogaran, Gunasekaran; Varatharajan, R; Chilamkurti, Naveen; Secure disintegration protocol for privacy preserving cloud storage Wireless Personal Communications Jan-17 2018 Springer US
  • Chilamkurti, Naveen; Dogra, Debi Prosad; Psannis, Kostas; Editorial Note: Emerging Multimedia Technology for Multimedia-centric IoT 2018
  • Abeshu, Abebe; Chilamkurti, Naveen; Deep learning: the frontier for distributed attack detection in fog-to-things computing IEEE Communications Magazine 56 2 169-175 2018 IEEE
  • Wang, Wei; Si, Miaomiao; Pang, Yu; Ran, Peng; Wang, Huiqian; Jiang, Xiaoming; Liu, Yu; Wu, Jun; Wu, Wei; Chilamkurti, Naveen; An encryption algorithm based on combined chaos in body area networks Computers & Electrical Engineering 65 282-291 2018 Pergamon
  • Kim, Bryan; Chilamkurti, Naveen; Dogra, Debi Prosad; Psannis, Kostas; Editorial Note: Emerging Multimedia Technology for Multimedia-centric IoT 2018 "SPRINGER VAN GODEWIJCKSTRAAT 30  3311 GZ DORDRECHT  NETHERLANDS"
  • Subramaniyaswamy, V; Manogaran, Gunasekaran; Logesh, R; Vijayakumar, V; Chilamkurti, Naveen; Malathi, D; Senthilselvan, N; An ontology-driven personalized food recommendation in IoT-based healthcare system The Journal of Supercomputing Jan-33 2018 Springer US
  • Chisanga, David; Keerthikumar, Shivakumar; Mathivanan, Suresh; Chilamkurti, Naveen; Integration of heterogeneous ‘omics’ data using semi-supervised network labelling to identify essential genes in colorectal cancer Computers & Electrical Engineering 67 267-277 2018 Pergamon
  • Nawaratne, Rashmika; Alahakoon, Damminda; De Silva, Daswin; Chhetri, Prem; Chilamkurti, Naveen; Self-evolving intelligent algorithms for facilitating data interoperability in IoT environments Future Generation Computer Systems 86 421-432 2018 North-Holland
  • Diro, Abebe Abeshu; Chilamkurti, Naveen; Nam, Yunyoung; Analysis of lightweight encryption scheme for fog-to-things communication IEEE Access 6 26820-26830 2018 IEEE
  • Bedingfield, Sue; Alahakoon, Damminda; Genegedera, Hiran; Chilamkurti, Naveen; Multi-granular electricity consumer load profiling for smart homes using a scalable big data algorithm Sustainable cities and society 40 611-624 2018 Elsevier
  • Manogaran, Gunasekaran; Lopez, Daphne; Chilamkurti, Naveen; In-Mapper combiner based MapReduce algorithm for processing of big climate data Future Generation Computer Systems 86 433-445 2018 North-Holland
  • Kumari, Raj; Kaushal, Sakshi; Chilamkurti, Naveen; Energy conscious multi-site computation offloading for mobile cloud computing Soft Computing 22 20 6751-6764 2018 Springer Berlin Heidelberg
  • Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; Special issue on recent advancements in machine learning algorithms for internet of things Design Automation for Embedded Systems 22 3 199-200 2018 Springer US
  • Abdel-Basset, Mohamed; Manogaran, Gunasekaran; Mohamed, Mai; Chilamkurti, Naveen; Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem Future Generation Computer Systems 89 19-30 2018 North-Holland
  • Rathore, M Mazhar; Paul, Anand; Ahmad, Awais; Chilamkurti, Naveen; Hong, Won-Hwa; Seo, HyunCheol; Real-time secure communication for Smart City in high-speed Big Data environment Future Generation Computer Systems 83 638-652 2018 North-Holland
  • Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; "Special issue on machine learning algorithms for internet of things fog computing and cloud computing" 2018 Springer Vienna
  • Desai, Sanket; Alhadad, Rabei; Chilamkurti, Naveen; Mahmood, Abdun; A survey of privacy preserving schemes in IoE enabled Smart Grid Advanced Metering Infrastructure Cluster Computing 22 1 43-69 2019 Springer US
  • Kumar, Priyan Malarvizhi; Devi, Usha; Manogaran, Gunasekaran; Sundarasekar, Revathi; Chilamkurti, Naveen; Varatharajan, Ramachandran; Ant colony optimization algorithm with Internet of Vehicles for intelligent traffic control system Computer Networks 144 154-162 2018 Elsevier
  • Abdel-Basset, Mohamed; Gunasekaran, M; Mohamed, Mai; Chilamkurti, Naveen; "A framework for risk assessment management and evaluation: Economic tool for quantifying risks in supply chain" Future Generation Computer Systems 90 489-502 2019 North-Holland
  • Jaeik, Cho; Chilamkurti, Naveen; Wang, SJ; Editorial of special section on enabling technologies for industrial and smart sensor internet of things systems The Journal of Supercomputing 74 9 4171-4172 2018 Springer US
  • Diro, Abebe; Chilamkurti, Naveen; Leveraging LSTM networks for attack detection in fog-to-things communications IEEE Communications Magazine 56 9 124-130 2018 IEEE
  • Jayaratne, Madhura; Nallaperuma, Dinithi; De Silva, Daswin; Alahakoon, Damminda; Devitt, Brian; Webster, Kate E; Chilamkurti, Naveen; A data integration platform for patient-centered e-healthcare and clinical decision support Future Generation Computer Systems 92 996-1008 2019 North-Holland
  • Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; "Emerging trends issues and challenges in Internet of Medical Things and wireless networks" Personal and Ubiquitous Computing 22 05-Jun 879-882 2018 Springer London
  • Choi, Ken; Chilamkurti, Naveen; Choi, Thomas Wook; Editorial Note: Multimedia-Aware IoT System Design 2018
  • Sundarasekar, Revathi; Thanjaivadivel, M; Manogaran, Gunasekaran; Kumar, Priyan Malarvizhi; Varatharajan, R; Chilamkurti, Naveen; Hsu, Ching-Hsien; Internet of things with maximal overlap discrete wavelet transform for remote health monitoring of abnormal ECG signals Journal of medical systems 42 11 228 2018 Springer US
  • Duneja, Aditya; Puyalnithi, Thendral; Vankadara, Madhu Viswanatham; Chilamkurti, Naveen; Analysis of inter-concept dependencies in disease diagnostic cognitive maps using recurrent neural network and genetic algorithms in time series clinical data for targeted treatment Journal of Ambient Intelligence and Humanized Computing 01-Sep 2018 Springer Berlin Heidelberg
  • Manickam, Adhiyaman; Devarasan, Ezhilmaran; Manogaran, Gunasekaran; Chilamkurti, Naveen; Vijayan, Vijayarajan; Saraff, Shubham; Samuel, RD Jackson; Krishnamoorthy, Raja; Bio-medical and latent fingerprint enhancement and matching using advanced scalable soft computing models Journal of Ambient Intelligence and Humanized Computing Jan-13 2018 Springer Berlin Heidelberg
  • Imran, Muhammad; Jabbar, Sohail; Chilamkurti, Naveen; Rodrigues, Joel JPC; Enabling technologies for Social Internet of Things 2019 North-Holland
  • Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; Editorial Note: Machine Learning for Visual Analysis of Multimedia Data 2018
  • Manogaran, Gunasekaran; Chilamkurti, Naveen; Hsu, Ching-Hsien; Emerging intelligent algorithms: challenges and applications 2018 Springer London
  • Papazis, Kon; Chilamkurti, Naveen; Detecting indicators of deception in emulated monitoring systems Service Oriented Computing and Applications Jan-13 2019 Springer London
  • Lakshmanaprabu, SK; Shankar, K; Ilayaraja, M; Nasir, Abdul Wahid; Vijayakumar, V; Chilamkurti, Naveen; Random forest for big data classification in the internet of things using optimal features International Journal of Machine Learning and Cybernetics 01-Oct 2019 Springer Berlin Heidelberg
  • Moreira, Mário WL; Rodrigues, Joel JPC; Carvalho, Francisco HC; Chilamkurti, Naveen; Al-Muhtadi, Jalal; Denisov, Victor; Biomedical data analytics in mobile-health environments for high-risk pregnancy outcome prediction Journal of Ambient Intelligence and Humanized Computing Jan-14 2019 Springer Berlin Heidelberg
  • Arunkumar, S; Subramaniyaswamy, V; Vijayakumar, V; Chilamkurti, Naveen; Logesh, R; SVD-based Robust Image Steganographic Scheme using RIWT and DCT for Secure Transmission of Medical Images Measurement 2019 Elsevier
  • Zhang, Hao; Zhang, Wenjun; Lv, Zhihan; Sangaiah, Arun Kumar; Huang, Tao; Chilamkurti, Naveen; MALDC: a depth detection method for malware based on behavior chains World Wide Web Jan-20 2019 Springer US
  • Jegadeesan, Subramani; Azees, Maria; Kumar, Priyan Malarvizhi; Manogaran, Gunasekaran; Chilamkurti, Naveen; Varatharajan, R; Hsu, Ching-Hsien; An Efficient Anonymous Mutual Authentication Technique For Providing Secure Communication In Mobile Cloud Computing For Smart City Applications Sustainable Cities and Society 101522 2019 Elsevier
  • Sharma, Ashutosh; Rathee, Geetanjali; Kumar, Rajiv; Saini, Hemraj; Vijaykumar, V; Nam, Yunyoung; Chilamkurti, Naveen; "A Secure Energy-and SLA-Efficient (SESE) E-Healthcare Framework for Quickest Data Transmission Using Cyber-Physical System" Sensors 19 9 2119 2019 Multidisciplinary Digital Publishing Institute
  • Manogaran, Gunasekaran; Baskar, S; Shakeel, P Mohamed; Chilamkurti, Naveen; Kumar, R; Analytics in real time surveillance video using two-bit transform accelerative regressive frame check Multimedia Tools and Applications Jan-18 2019 Springer US
  • Appathurai, Ahilan; Manogaran, Gunasekaran; Chilamkurti, Naveen; "Trusted FPGA-based transport traffic inject impersonate (I2) attacks beaconing in the Internet of Vehicles" IET Networks 8 2106-115 2018 IET Digital Library
  • Khadam, Umair; Iqbal, Muhammad Munwar; Azam, Muhammad Awais; Khalid, Shehzad; Rho, Seungmin; Chilamkurti, Naveen; Digital Watermarking Technique for Text Document Protection Using Data Mining Analysis IEEE Access 7 64955-64965 2019 IEEE.
  • F. Maqsood, A. Khan, I. Ahmed, M. Tahir, M. Aleem, M. Ahmed, A. Ahmed, R. Alhadad. "A Fault Tolerant Fragile Watermarking-Based False Data Injection Attacks Detection Scheme in Smart Grids to Design Automation for Embedded Systems". Design Automation for Embedded Systems, Springer 2018 under second review.

Conferences

  • Slay, J, 2018, ‘Towards developing network forensic mechanism for botnet activities in the IoT based on machine learning techniques.’, Proceedings of 9th international conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Vol. 235, p. 30, Springer.
  • Moustafa, N., & Slay, J, 2018, ‘A Network Forensic Scheme Using Correntropy- Variation for Attack Detection’, Advances in Digital Forensics IX, Springer, Boston, pp. 225-239.
  • Moustafa, N., Creech, G & Slay, J, 2018, ‘Flow Aggregator Module for Analysing Network Traffic’, Progress in Computing, Analytics and Networking, Springer, Singapore, pp.19-29.
  • Moustafa, N., Creech, G & Slay, J, 2018, Anomaly Detection System Using Beta Mixture Models and Outlier Detection, Progress in Computing, Analytics and Networking, Springer, Singapore, pp.125-135.
  • Micallef, N. and Arachchilage, N. A. G., (2019), "That's Not Me! Designing Fictitious Proles to Answer Security Questions", 15th Symposium on Usability, Privacy, and Security (SOUPS '19), USENIX, on August 11 - 12, 2019, Santa Clara, CA, USA. [CORE/ERA ranking - B]
  • A. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang: (2018) Accessing Data from Multiple Sources Through Context-Aware Access Control, IEEE TrustCom 2018: 551-559 (rank: A, published)
  • A. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon, Syed Mahbub, Eric Pardede, Elizabeth Chang: (2018) Dynamic Transitions of States for Context-Sensitive Access Control Decision WISE 2018: 127-142 (rank: A, published)
  • A. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang, Jun Han: (2017) Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy L
  • P. Raviteja, Khoa T. Phan, Yi Hong, Emanuele Viterbo, ``Orthogonal Time Frequency Space (OTFS) Modulation Based Radar System,'' Radar Conference 2019.
  • Raviteja P, Phan K,  THong Y, Viterbo E. Embedded Delay-Doppler Channel Estimation for Orthogonal Time Frequency Space Modulation.  IEEE Vehicular Technology Conference. 2018
  • Phan K, THong Y, Viterbo E. Adaptive resource allocation for secure two-hop communication.  IEEE Wireless Communications and Networking Conference, WCNC. 2018
  • Raviteja P, Phan K, T Jin Q, Hong Y, Viterbo E. Low-complexity iterative detection for orthogonal time frequency space modulation.  IEEE Wireless Communications and Networking Conference, WCNC. 2018.
  • Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices, IEEE TrustCom 2019.
  • Elhdad, R., Chilamkurti, N., and Torabi, T. (2011), "A Novel Design for the Production Process Using Ontology and Business Rules." IEEE Conference on Industrial Electronics and Applications, Beijing, China, vol. ICIEA 2011, pp. 1519-1524.[Published by IEEE].
  • Wijayarathna, C., Arachchilage, N. A. G., (2019), "An Empirical Usability Analysis of the Google Authentication API", In Proceedings of the 23rd International Conference on Evaluation and Assessment in Software Engineering 2019 (EASE'19). ACM, New York, NY, USA. [CORE/ERA ranking - A]
  • Dixon, M., Arachchilage, N. A. G., Nicholson, J., (2019). "Engaging Users with Educational Games: The Case of Phishing". In CHI Conference on Human Factors in Computing Systems Proceedings (CHI 2019), May 4{9, 2019, Glasgow, Scotland Uk. ACM, New York, NY, USA, 6 pages. [CORE/ERA ranking -A]
  • Senarath, A., Arachchilage, N. A. G., Grobler, M., (2019), "A model for system developers to measure the perceived privacy risk of users", 52nd Hawaii International Conference on System Sciences (HICSS), January 8-10, GrandWailea, Maui, Hawaii, USA. [CORE/ERA ranking - A]
  • Wijayarathna, C., Arachchilage, N. A. G., (2019),, "Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding", 52nd Hawaii International Conference on System Sciences (HICSS), January 8-10, Grand Wailea, Maui, Hawaii, USA. [CORE/ERA ranking - A]
  • Wijayarathna, C., Arachchilage, N. A. G., (2018), "A methodology to Evaluate the Usability of Security APIs", IEEE International Conference on Information and Automation for Sustainability (ICIAfS). IEEE, 21-22 December 2018, Colombo, Sri Lanka.
  • Baral, G, Arachchilage, N. A. G., (2018), "Building Confidence not to be Phished through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour", 9th International Conferences on Cyber Security and Communication Systems (ICCSCS). Springer, 10 - 12, December 2018, Melbourne, Australia.
  • Hameed, M. A. and Arachchilage, N. A. G., (2018), "A Model for the Adoption Process of Information System Security Innovations in Organisations: A Theoretical Perspective", 17th Australian Cyber Warfare Conference (CWAR) Conference, October 10-11th, 2018, Melbourne, Victoria, Australia.
  • Wijayarathna, C., Arachchilage, N. A. G., (2018), "Am I Responsible for End-User's Security? A Programmer's Perspective", The 4th Workshop on Security Information Workers (WSIW), 14th Symposium on Usability, Privacy, and Security (SOUPS '18), USENIX, on August 12 - 14, 2018, Baltimore, MD, USA. [CORE/ERA ranking - B]
  • Senarath, A., Arachchilage, N. A. G., (2018), "Understanding Software Developers’ Approach towards Implementing Data Minimization", The 4th Workshop on Security Information Workers (WSIW), 14th Symposium on Usability, Privacy, and Security (SOUPS '18), USENIX, on August 12 - 14, 2018, Baltimore, MD, USA. [CORE/ERA ranking - B]
  • Wijayarathna, C., Arachchilage, N. A. G., (2018), "Why Johnny Can't Store Passwords Securely? A Usability Evaluation of Bouncycastle Password Hashing”, In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018 (EASE'18). ACM, New York, NY, USA, 211-216. DOI: https://doi.org/10.1145/3210459.3210484 [CORE/ERA ranking - A]
  • Senarath, A., Arachchilage, N. A. G., (2018), \Why developers cannot embed privacy into software systems? An empirical investigation", In Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018 (EASE'18). ACM, New York, NY, USA, 211-216. DOI: https://--doi.org/10.1145/3210459.3210484 [CORE/ERA ranking - A] [Best Paper Award].

Chapter

  • Stanley Shanapinda, ‘Habilitando a Localização de Dados para Cidades Inteligentes: Explorando os Regimes de Proteção e Retenção de Metadados no Brasil’ in Jhessica Reia, Pedro Augusto P. Francisco, Marina Barros and Eduardo Magrani (eds) ‘Horizonte presente: Debates de tecnologia e sociedade’  Publisher: Letramento, 2018 [trans of: Enabling Data Location for Smart Cities: Exploring the Metadata Protection and Retention Regime in Brazil, Present Horizons: Debates on Technology and Society].
  • Ng A Chen S. A Study of Contemporary System Performance Testing Framework. 1546-1561. 2019
  • Ng A Watters P Chen S. A technology and process analysis for contemporary identity management frameworks.  955-1008. 2019.
  • Hameed, M. A., Arachchilage, N.A.G., (2019), “A Conceptual Model for the Organisational Adoption of Information System Security Innovations”, In Joshi., R. C. (Ed.) Security, Privacy, and Forensics Issues in Big Data. IGI Global.
  • Senarath, A., Arachchilage, N. A. G., (2019), “Unheard Story of Organizational Motivations Towards User Privacy”, In Joshi., R. C. (Ed.) Security, Privacy, and Forensics Issues in Big Data. IGI Global.
  • Arachchilage, N.A.G., Hameed, M. A., (2019), “Teaching Johnny to Thwart Phishing Attacks: Incorporating the Role of Self-Efficacy into a Game Application”, In Gupta, B. B. (Ed.) Computer and Cyber Security: Principles, Algorithm, Applications and Perspectives. CRC Press, Taylor & Francis.