Folgen
Kalum Priyanath Udagepola
Kalum Priyanath Udagepola
Scientific Research Development Institute of Technology Australia
Bestätigte E-Mail-Adresse bei srdita.com.au - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies
MA F Tchakounte,VS Nyassi, DEH Danga, KP Udagepola
EAI Endorsed Transactions on Scalable Information Systems, 2020
16*2020
LimonDroid: a system coupling three signature-based schemes for profiling Android malware
F Tchakounté, RCN Ngassi, VC Kamla, KP Udagepola
Iran Journal of Computer Science 3 (2), 20, 2020
162020
The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission
A Shahzad, KP Udagepola, Y Lee, S Park, M Lee
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 1-15, 2015
122015
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network
F Tchakounte, M Nakoe, BO Yenke, KP Udagepola
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8 (4 …, 2019
82019
Mobile sensor networks and robotics
KP Udagepola
Internet of Things and Big Data Analytics Toward Next-Generation …, 2018
72018
Access-Pattern Aware Check-Pointing Data Storage Scheme for Mobile Computing Environment
X Li, M Yang, CG Men, YT Jiang, KP Udagepola
11th International Conference on Mobile Systems and Pervasive Computing …, 2014
62014
Review of data consistency and integrity constraints in spatial databases
KP Udagepola, L Xiang, Y Xiaozong, AW Wijeratne
Proceedings of the 5th WSEAS Int. Conf. on Artificial Intelligence …, 2006
42006
Optimizing packet size via maximizing throughput efficiency of arq on bluetooth acl data communication link
L Xiang, KP Udagepola, YX Zong
Proceedings of the 5th WSEAS Int. Conf. on AppliedInformatics and Communications, 2005
42005
True Request-Fake Response: A New Trend of Spear Phishing Attack
F Tchakounté, VS Nyassi, KP Udagepola
Journal of Network Security 7 (3), 17, 2019
32019
MSRIC: a model for spatial relations and integrity constraints in topographic databases
KP Udagepola, L Xiang, Y Xiaozong, AW Wijeratne
5th Int. Conf. on Artificial Intelligence, Knowledge Engineering and …, 2006
32006
Determinants of cybercrime victimization: Experiences and multi-stage recommendations from a survey in cameroon
JE Ntsama, F Tchakounte, D Tchakounte Tchuimi, A Faissal, ...
International Conference on e-Infrastructure and e-Services for Developing …, 2022
22022
A Framework for Spatial Data Visualization: Sri Lanka Globe (S-Globe)
KP Udagepola
37th Asian Conference on Remote Sensing, 2016
22016
Finite element simulation of the effect of loading rate on the stress-strain behaviour of Albany sand
MA Hena, S Mohammed, K Udagepola
J.Natn.Sci.Foundation Sri Lanka 44 (2), 203-209, 2016
2*2016
Semantic Integrity Constraint Violations Check for Spatial Database Updating
KP Udagepola, L Xiang, AW Wijeratne, Y Xiaozong
5th Int. Symposium on Mobile Mapping Technology (MMT2007), 328~334, 2008
22008
Semantic Spatial Objects Data Structure for Spatial Access Method
KP Udagepola, Z Decheng, W Zhibo, Y Xiaozong
International Journal of Applied mathematics and computer science 4 (2), 656-663, 2007
22007
Efficient management of spatial databases by data consistency and integrity constraints.
KP Udagepola, X Li, HW Liu, XZ Yang
WSEAS Transactions on Computers 5 (2), 447-454, 2006
22006
Mobile money phishing cybercrimes: Vulnerabilities, taxonomies, characterization from an investigation in cameroon
A Nzeket Njoya, F Tchakounté, M Atemkeng, KP Udagepola, D Bassolé
International Conference on e-Infrastructure and e-Services for Developing …, 2022
12022
Use of artificial neural networks and support vector machines to predict lacking traffic survey data
M Siddiquee, KP Udagepola
NSF: Colombo, 2017
12017
Review Social Network Analysis and Mining: Link Prediction
K Udagepola, F Chiroma
International Journal of Information and Electronics Engineering 6 (4), 265-268, 2016
12016
An Adaptive Controller of Traffic Lights using Genetic Algorithms
KP Udagepola, BA Alshami, N Afzal, X Li
Progress in Systems Engineering, 669-672, 2015
12015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20