Skip to main content

Showing 1–4 of 4 results for author: de Zoysa, K

.
  1. arXiv:2312.11301  [pdf, other

    cs.CR

    Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis

    Authors: Lojenaa Navanesana, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara

    Abstract: Investigation on smart devices has become an essential subdomain in digital forensics. The inherent diversity and complexity of smart devices pose a challenge to the extraction of evidence without physically tampering with it, which is often a strict requirement in law enforcement and legal proceedings. Recently, this has led to the application of non-intrusive Electromagnetic Side-Channel Analysi… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  2. arXiv:2208.08486  [pdf, other

    cs.CL

    EmoMent: An Emotion Annotated Mental Health Corpus from two South Asian Countries

    Authors: Thushari Atapattu, Mahen Herath, Charitha Elvitigala, Piyanjali de Zoysa, Kasun Gunawardana, Menasha Thilakaratne, Kasun de Zoysa, Katrina Falkner

    Abstract: People often utilise online media (e.g., Facebook, Reddit) as a platform to express their psychological distress and seek support. State-of-the-art NLP techniques demonstrate strong potential to automatically detect mental health issues from text. Research suggests that mental health issues are reflected in emotions (e.g., sadness) indicated in a person's choice of language. Therefore, we develope… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: This work has been accepted to appear at COLING 2022 Conference

  3. arXiv:2202.07883  [pdf, other

    cs.CR

    CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

    Authors: Wathsara Daluwatta, Ravindu De Silva, Sanduni Kariyawasam, Mohamed Nabeel, Charith Elvitigala, Kasun De Zoysa, Chamath Keppitiyagama

    Abstract: Ability to effectively investigate indicators of compromise and associated network resources involved in cyber attacks is paramount not only to identify affected network resources but also to detect related malicious resources. Today, most of the cyber threat intelligence platforms are reactive in that they can identify attack resources only after the attack is carried out. Further, these systems… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

    Comments: threat intelligence graph investigation

  4. arXiv:2111.00142  [pdf, other

    cs.CR cs.LG

    Uncovering IP Address Hosting Types Behind Malicious Websites

    Authors: Nimesha Wickramasinghe, Mohamed Nabeel, Kenneth Thilakaratne, Chamath Keppitiyagama, Kasun De Zoysa

    Abstract: Hundreds of thousands of malicious domains are created everyday. These malicious domains are hosted on a wide variety of network infrastructures. Traditionally, attackers utilize bullet proof hosting services (e.g. MaxiDed, Cyber Bunker) to take advantage of relatively lenient policies on what content they can host. However, these IP ranges are increasingly being blocked or the services are taken… ▽ More

    Submitted 28 November, 2021; v1 submitted 29 October, 2021; originally announced November 2021.