Duminda Wijesekera
Researcher
Duminda Wijesekera's AcademicInfluence.com Rankings

Download Badge
Computer Science
Duminda Wijesekera's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science University Grants Commission
Similar Degrees You Can Earn
Why Is Duminda Wijesekera Influential?
(Suggest an Edit or Addition)According to Wikipedia, Duminda Wijesekera is an American Computer Scientist of Sri Lankan descent. He is a professor in the Department of Computer Science at George Mason University and acting chair of Cyber Security Engineering Department. He is also a visiting research scientist at the National Institute of Standards and Technology . He has a PhD in Computer Science from the University of Minnesota and another PhD in Mathematical Logic from Cornell University . He has a Bachelors in Mathematics from University of Colombo. He also holds a courtesy appointments at the Computer Science Department at the Naval Postgraduate School, NIST. He has published more than 100 research papers in the area of cybersecurity. He was also part of the team that investigated Metro Blue Line derailment in Washington DC.
Duminda Wijesekera's Published Works
Published Works
- Scalable, graph-based network vulnerability analysis (2002) (822)
- A logic-based framework for attribute based access control (2004) (301)
- Detecting VoIP Floods Using the Hellinger Distance (2008) (158)
- Model-Based Covert Timing Channels: Automated Modeling and Evasion (2008) (146)
- Status-Based Access Control (2008) (132)
- VoIP Intrusion Detection Through Interacting Protocol State Machines (2006) (129)
- A propositional policy algebra for access control (2003) (123)
- Provisions and Obligations in Policy Management and Security Applications (2002) (120)
- SQLProb: a proxy-based architecture towards preventing SQL injection attacks (2009) (112)
- DNPSec: Distributed Network Protocol Version 3 (DNP3) Security Framework (2007) (110)
- Obligation monitoring in policy management (2002) (104)
- Securing OLAP data cubes against privacy breaches (2004) (87)
- Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt (2002) (87)
- Constructive Modal Logics I (1990) (86)
- Experimental evaluation of loss perception in continuous media (1999) (84)
- Provisions and Obligations in Policy Rule Management (2003) (71)
- Fast Detection of Denial-of-Service Attacks on IP Telephony (2006) (70)
- Revocations - A classification (2001) (70)
- Executable misuse cases for modeling security concerns (2008) (66)
- Quality of service (QoS) metrics for continuous media (2004) (46)
- authUML: a three-phased framework to analyze access control specifications in use cases (2003) (44)
- Policy algebras for access control the predicate case (2002) (42)
- Cardinality-based inference control in data cubes (2004) (42)
- Ontologies for modeling enterprise level security metrics (2010) (40)
- Pattern Directed Mining of Sequence Data (1998) (39)
- Policy-based dissemination of partial web-ontologies (2005) (37)
- Detecting malicious ADS-B broadcasts using wide area multilateration (2015) (35)
- Using Attack Graphs in Forensic Examinations (2012) (34)
- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches (2003) (34)
- Policy algebras for access control: the propositional case (2001) (31)
- Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (2005) (30)
- Online detection of network traffic anomalies using behavioral distance (2009) (30)
- Voice pharming attack and the trust of VoIP (2008) (29)
- Security and the US rail infrastructure (2008) (29)
- An authorization model for multimedia digital libraries (2004) (29)
- Measured responses to cyber attacks using Schmitt analysis: a case study of attack scenarios for a software-intensive system (2003) (28)
- Consistent and Complete Access Control Policies in Use Cases (2003) (28)
- Performance Analysis of Web Services on Mobile Devices (2012) (28)
- Mapping evidence graphs to attack graphs (2012) (26)
- Cardinality-Based Inference Control in Sum-Only Data Cubes (2002) (26)
- Integrity and authenticity of ADS-B broadcasts (2015) (25)
- A Lightweight Framework for Web Services Implementations on Mobile Devices (2012) (24)
- Tableaux for constructive concurrent dynamic logic (2005) (23)
- Securing UML Information Flow Using FlowUML (2006) (23)
- A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules (2010) (22)
- Mining Cinematic Knowledge Work in Progress [An Extended Abstract] (2000) (22)
- A Logic-Based Network Forensic Model for Evidence Analysis (2015) (21)
- Regulating access to SMIL formatted pay-per-view movies (2002) (20)
- Forensic Web Services (2008) (20)
- An Algebra for Composing Ontologies (2006) (19)
- Securing VoIP and PSTN from integrated signaling network vulnerabilities (2006) (19)
- Positive Train Control (PTC) failure modes (2011) (18)
- Towards Session-Aware RBAC Administration and Enforcement with XACML (2009) (17)
- An ADS-B Intrusion Detection System (2016) (16)
- Securing the ZigBee Protocol in the Smart Grid (2012) (16)
- Creating Integrated Evidence Graphs for Network Forensics (2013) (16)
- Runtime Administration of an RBAC Profile for XACML (2011) (16)
- Key distribution mechanism in secure ADS-B networks (2015) (16)
- Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks (2019) (15)
- Relating counterexamples to test cases in CTL model checking specifications (2007) (15)
- Designing An IEC 61850 Based Power Distribution Substation Simulation / Emulation Testbed for Cyber-Physical Security Studies (2016) (15)
- Identifying Evidence for Cloud Forensic Analysis (2017) (15)
- A policy driven approach to email services (2004) (14)
- PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents (2007) (13)
- A role-based XACML administration and delegation profile and its enforcement architecture (2009) (13)
- Communications Based Positive Train Control Systems Architecture in the USA (2006) (13)
- SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture (2005) (12)
- Preserving Privacy in On-Line Analytical Processing (OLAP) (2006) (12)
- SS7 over IP: signaling interworking vulnerabilities (2006) (12)
- A Model Towards Using Evidence from Security Events for Network Attack Analysis (2014) (12)
- Tracking Skype VoIP Calls Over The Internet (2010) (11)
- Building Dialysis Workflows into EMRs (2013) (11)
- Rail Radio Intrusion Detection System (RRIDS) for Communication Based Train Control (CBTC) (2016) (11)
- Secure overlay communication and control model for decentralized autonomous control of smart micro-grids (2019) (11)
- A Probabilistic Network Forensic Model for Evidence Analysis (2016) (11)
- Vehicular dynamics based plausibility checking (2017) (10)
- XACML Policies for Exclusive Resource Usage (2007) (10)
- FlexFlow: A Flexible Flow Control Policy Specification Framework (2003) (10)
- Experimental evaluation of PFS continuous media file system (1997) (10)
- Semantic-Aware Data Protection in Web Services (2006) (10)
- Communications Security Concerns in Communications Based Train Control (2006) (10)
- Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction (2014) (10)
- Enforcing Integrity in Multimedia Surveillance (2003) (10)
- Enforcing Semantics-Aware Security in Multimedia Surveillance (2005) (10)
- Secure communications based train control (cbtc) operations (2009) (10)
- Constraints, Inference Channels and Secure Databases (2000) (10)
- Providing wireless bandwidth for high-speed rail operations : final report. (2016) (10)
- A testbed for large mobile social computing experiments (2010) (9)
- TVIS: Tactical Voice Interaction Services for dismounted urban operations (2008) (9)
- An evidence generation model for web services (2009) (9)
- Multimedia Access Control Using RDF Metadata (2003) (9)
- Detecting malicious ADS-B transmitters using a low-bandwidth sensor network (2015) (9)
- ADS-Bsec: A Holistic Framework to Secure ADS-B (2018) (9)
- An agent-based framework for assessing missile defense doctrine and policy (2005) (8)
- MTPSec: customizable secure MTP3 tunnels in the SS7 network (2005) (8)
- BPEL orchestration of secure webmail (2006) (8)
- Removing permissions in the flexible authorization framework (2003) (8)
- Securing Positive Train Control Systems (2007) (8)
- Subject Switching Algorithms for Access Control in Federated Databases (2001) (8)
- Specifying multimedia access control using RDF (2004) (7)
- Meta-models for misuse cases (2009) (7)
- Consent-based Workflow Control in EMRs☆ (2014) (7)
- Key management requirements for Positive Train Control communications security (2006) (7)
- Email feedback: a policy-based approach to overcoming false positives (2005) (7)
- A Case Study of Cognitive Radio Networks: Secure Spectrum Management for Positive Train Control Operations (2017) (7)
- Maintaining privacy on derived objects (2005) (7)
- Performance evaluation of media losses in the Continuous Media Toolkit (1998) (7)
- Key management requirements for PTC operations (2007) (7)
- An Intrusion Detection System for Detecting Phishing Attacks (2007) (7)
- Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes (2014) (7)
- Towards Secure XML Federations (2002) (7)
- Informed Consent in Electronic Medical Record Systems (2015) (7)
- Incorporating Dynamic Constraints in the Flexible Authorization Framework (2004) (7)
- Evaluating distributed xacml policies (2007) (7)
- Preemptive mechanism to prevent health data privacy leakage (2011) (6)
- A testbed for mobile social computing (2009) (6)
- Formalizing and Verifying Workflows Used in Blood Banks (2014) (6)
- Secure ADS-B framework “ADS-Bsec” (2016) (6)
- Modeling Dynamic Role-based Access Constraints using UML (2003) (6)
- Olap Means On-line Anti-privacy * (2003) (6)
- BMD Agents: An Agent-Based Framework to Model Ballistic Missile Defense Strategies (2005) (6)
- SECRETS: A Secure Real-Time Multimedia Surveillance System (2004) (5)
- ADS-Bsec: A novel framework to secure ADS-B (2017) (5)
- A layered graphical model for mission attack impact analysis (2017) (5)
- Ontological Constructs to Create Money Laundering Schemes (2010) (5)
- Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services (2010) (5)
- Creating Objects in the Flexible Authorization Framework (2006) (5)
- Preserving Privacy in On-line Analytical Processing Data Cubes (2006) (5)
- Dynamically Generating Policy Compliant Dialogues for Physical Access Control (2013) (5)
- An Ontology for Medical Treatment Consent (2014) (5)
- Security in Federated Database Systems (2001) (5)
- Use-Misuse Case Driven Analysis of Positive Train Control (2006) (4)
- Leveraging an Inventory of the Cognitive Radio Attack Surface (2012) (4)
- Mapping Misuse Cases to Functional Fault Trees in Order to Secure Positive Train Control Systems (2006) (4)
- Securing Workflows with XACML, RDF and BPEL (2008) (4)
- Risk-adaptive Engine for Secure ADS-B Broadcasts (2015) (4)
- Cognitive radio technologies: Envisioning the realization of network-centric warfare (2012) (4)
- A Policy-Based Dialogue System for Physical Access Control (2012) (4)
- Key distribution scheme for aircraft equipped with secure ADS-B IN (2017) (4)
- On the Provision of Safety Assurance via Safety Kernels for Modern Weapon Systems (2006) (4)
- The DADSim air defense simulation environment (2000) (4)
- Secure ADS-B design & evaluation (2015) (4)
- A Flexible Authorization Framework for E-Commerce (2004) (4)
- Smart Parking Zones using Dual Mode Routed Bluetooth Fogged Meshes (2019) (4)
- Formal Methods in Cyberphysical Systems (2021) (4)
- A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis (2018) (4)
- Using Ontological Information to Enhance Responder Availability in Emergency Response (2010) (4)
- Trust-based secure Positive Train Control (PTC) (2008) (4)
- POSTER: A Logic Based Network Forensics Model for Evidence Analysis (2015) (3)
- Optimizing Lawful Responses to Cyber Intrusions (2005) (3)
- Using dynamic risk estimation & social network analysis to detect money laundering evolution (2013) (3)
- Forensics filesystem with cluster-level identifiers for efficient data recovery (2012) (3)
- Knowledge sharing honeynets (2005) (3)
- Extracting Kerberos passwords through RC4-HMAC encryption type analysis (2008) (3)
- Achieving Peer-to-Peer Telecommunication Services through Social Hashing (2009) (3)
- Authentication and integrity in telecommunication signaling network (2005) (3)
- Forensics over Web Services: The FWS (2010) (3)
- Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness (2018) (3)
- A Composite Risk Model for Railroad Operations Utilizing Positive Train Control (PTC) (2014) (3)
- Tableaux for Functional Dependencies and Independencies (1997) (3)
- MERGING SUB EVIDENCE GRAPHS TO AN INTEGRATED EVIDENCE GRAPH FOR NETWORK FORENSICS ANALYSIS (2013) (3)
- A Methodology for Determining Forensic Data Requirements for Detecting Hypervisor Attacks (2018) (3)
- A multimedia programming toolkit/environment (1997) (3)
- Using RuleML to specify cross-domain information flow control policies (2009) (3)
- Cooperative Collision Avoidance by Sharing Vehicular Subsystem Data (2018) (3)
- An Authentication Mechanism for Accessing Mobile Web Services (2017) (3)
- An ontology-based distributed whiteboard to determine legal responses to online cyber attacks (2006) (3)
- Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads (2018) (3)
- Forensic Web Services Framework (2011) (3)
- Implementing Consistency Checking in Correlating Attacks (2004) (3)
- Reasoning with advanced policy rules and its application to access control (2004) (2)
- A society-integrated testbed architecture for peer-to-peer telecommunications (2009) (2)
- Secure Interchange Routing (2011) (2)
- Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems (2006) (2)
- Security and Dependability in Train Control Systems (2010) (2)
- THEMIS: Threat Evaluation Metamodel for Information Systems (2004) (2)
- An approach for risk assessment and mitigation in cognitive radio technologies (2013) (2)
- A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond (2019) (2)
- Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones (2004) (2)
- Enhancing the Usability of the Commercial Mobile Alert System (2011) (2)
- Providing Voice Privacy Over Public Switched Telephone Networks (2003) (2)
- Analyzing information flow control policies in requirements engineering (2004) (2)
- Online detection of web choreography misuses (2009) (2)
- Developing a Framework to Address Performance and Security Protocol Concerns in Identity Management for Interoperable Positive Train Control Systems (2012) (2)
- A Framework for Investigating Railroad Accidents (2007) (2)
- Identifying Evidence for Implementing a Cloud Forensic Analysis Framework (2017) (2)
- Efficiency of social connection-based routing in P2P VoIP networks (2010) (2)
- Security Requirements Analysis of ADS-B Networks (2014) (2)
- MLS-SMIL for Electronic Surveillance of Facilities with Multi-Level Security Requirements 2 (2003) (2)
- Protection and Recovery of Railroad Event Recorder Data (2008) (2)
- A Highly Recoverable and Efficient Filesystem (2014) (2)
- Secure UML Information Flow using FlowUML (2005) (2)
- A Communications Model for Decentralized Autonomous Control of the Power Grid (2018) (2)
- Sharing Data under Genetic Privacy Laws (2016) (2)
- Quality-of-service for continuous media metrics, validation, implementation and performance evaluation (1997) (2)
- QoP and QoS Policy Cognizant Module Composition (2010) (2)
- QoS Based Evaluation of the Berkeley Continuous Media Toolkit (1999) (2)
- Using Temporal Logic to Verify the Blood Supply Chain Safety (2016) (2)
- Safety and Security Analysis for Movable Railroad Bridges (2019) (2)
- Chapter 1 A LOGIC-BASED NETWORK FORENSICS MODEL FOR EVIDENCE ANALYSIS (2015) (2)
- Determining the Forensic Data Requirements for Investigating Hypervisor Attacks (2019) (2)
- An Ontological Inference Driven Interactive Voice Recognition System (2013) (1)
- TRUST-BASED SECURE POSITIVE TRAIN CONTROL (PTC) INTEROPERATION (2006) (1)
- Sharing Genetic Data under US Privacy Laws (2018) (1)
- Providing Cyber Situational Awareness (CSA) for PTC Using a Distributed IDS System (DIDS) (2018) (1)
- Informed Consent in Healthcare: A Study Case of Genetic Services (2017) (1)
- Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions (2014) (1)
- Forensics web services (FWS) (2010) (1)
- Security framework for supervisory control and data acquisition (scada) (2006) (1)
- Data Analytics to Detect Evolving Money Laundering (2013) (1)
- Creating non-decomposable stream bundles in multimedia web services using uSMIL (2004) (1)
- Identity Management for Interoperable PTC Systems in Bandwidth-Limited Environments: The Final Report, Part 3 (of three parts) The Proposed Solution (2014) (1)
- Smart Parking Zones Using Meshed Bluetooth Sensor Networks (2019) (1)
- ADS-B Attack Classification using Machine Learning Techniques (2021) (1)
- Honeynet Clusters as an early Warning System for Production Networks (2005) (1)
- An Ontological Inference Driven Interactive Voice Response System (2013) (1)
- Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security (2005) (1)
- Security Policy Cognizant Module Composition (2010) (1)
- Formal Verification of Cyberphysical Systems (2021) (1)
- Security Issues in VoIP Telecommunication Networks (2012) (1)
- An Automated Dialog System for Conducting Security Interviews for Access Control (2014) (1)
- Stable and Safe Automated Driving Using 3-D Road Geometric Features (2019) (1)
- AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System (2022) (1)
- Identity Management for Interoperable PTC Systems in Bandwidth-Limited Environments: The Final Report, Part 1 (of three parts) Introduction to The Project And Performance Studies (2014) (1)
- Can You Trust Zero Trust? (2022) (1)
- Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments (2020) (1)
- An evidence management model for web services behavior (2009) (1)
- Genetic Counseling Using Workflow-based EMRs (2015) (1)
- Methodology for enabling forensic analysis using hypervisor vulnerabilities data (2019) (1)
- Cyber Security Analysis for Advanced Train Control System (ATCS) in CTC Systems: Concepts and Methods (2019) (1)
- Dynamic Risk Model of Money Laundering (2013) (1)
- Pixel Invisibility: Detecting Objects Invisible in Color Images (2020) (1)
- Making Decisions about Legal Responses to Cyber Attacks (2005) (1)
- Small World VoIP (2010) (1)
- DNPSec Simulation Study (2007) (1)
- Computer-assisted validation and verification of cybersecurity requirements (2010) (1)
- Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords (2006) (1)
- Forensic capabilities for service-oriented architectures (2008) (1)
- Orchestrating BMD Control in Extended BPEL (2008) (1)
- Secure Surveillance using SMIL (2002) (1)
- Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory (2022) (1)
- Coordinating AV Dispatch with Smart Remote Parking (2019) (1)
- In-Flight Aircraft Smart Space Security using Multi-Entity Trust Evaluations (2018) (1)
- Pixel Invisibility: Detect Object Unseen in Color Domain (2021) (0)
- Editorial Advisory Board (2010) (0)
- Multimedia applications (2002) (0)
- Positive Train Control and the Rail Safety Improvement Act of 2008 (2010) (0)
- Analytical study of changing characteristics on built environment of the contemporary urban buddhist monastic architecture (2011) (0)
- Enforcing Security Policies in Requirements Engineering Using AFUML (2008) (0)
- Security requirement derivation by noun–verb analysis of use–misuse case relationships: a case study using positive train control (2013) (0)
- U.S. Regulatory Requirements for Positive Train Control Systems (2012) (0)
- Informed Consent in Healthcare (2020) (0)
- Session details: Access control policy (2006) (0)
- ENFORCING INTEGRITY IN MULTIMEDIA SURVEILLANCE † 2 (2005) (0)
- An Automated Framework for Generating Attack Graphs Using Known Security Threats (2022) (0)
- Incorporating access and flow control policies in requirements engineering (2004) (0)
- Chapter 16 CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS (2013) (0)
- A Key Management Module for Secure ADS-B (2022) (0)
- ON IEC 61850-BASED SUBSTATION INTERLOCKING FUNCTION USING DIRECT POWER FEEDBACK (2017) (0)
- Designing Quality of Service Based Multimedia Systems Using the Unified Modeling Language (2009) (0)
- 2012 IEEE First International Conference on Mobile Services, MS 2012, 24-29 June, 2012, Honolulu, Hawaii, USA (2012) (0)
- Voice privacy service over the public telephone network (2004) (0)
- Test and evaluation of distributed information system networks (1999) (0)
- Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks (2006) (0)
- Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007 (2007) (0)
- Forensics Web Services (2010) (0)
- Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback (2017) (0)
- Securing public and ip telephone networks (2007) (0)
- Performance Evaluation of Media Synchronization Losses in the Continuous Media Toolkit (1998) (0)
- An Ontology for Specifying Regulation-Compliant Genetic Privacy Policies (2018) (0)
- Normal forms and syntactic completeness proofs for functional independencies (2001) (0)
- Security requirement derivation by noun–verb analysis of use–misuse case relationships: a case study using positive train control (2014) (0)
- An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities (2021) (0)
- Risk Engine Design as a Key Security Enhancement to the Standard Architecture for Cognitive Radio (2015) (0)
- Secure Cross-Domain Train Scheduling (2009) (0)
- An Integrated Control and Intrusion Detection System for Smart Grid Security (2018) (0)
- An Attack-Fault Tree Analysis of a Movable Railroad Bridge (2019) (0)
- Requirements for self-stabilization of distributed advanced battle managers (2006) (0)
- Policy-controlled email services (2007) (0)
- Timely Delivery of Messages in Positive Train Control (2013) (0)
- Specifying Time-Out Points in Surgical EMRs-Work in Progress (2011) (0)
- Toward Representing and Recognizing Cyber-Physical Elements in Competition Using Event Semantics (2015) (0)
- Commercial Interoperable VoIP IA Architecture (2008) (0)
- U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials (2010) (0)
- Navigation Assistance Framework for Emergencies (2013) (0)
- Secure real-time service protocols in the dod environment (2006) (0)
- Identity switching for federated access control (2006) (0)
- Paper list (2009) (0)
- Parity-based inference control for multi-dimensional range sum queries (2007) (0)
- Enforcing semantics-aware security in multimedia documents (2004) (0)
- RDF Collections (2007) (0)
- Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity (2013) (0)
- Comparison of IPsec to TLS and SRTP for Securing VoIP (2007) (0)
- Toward Representing and Recognizing Cyber-Physical Autonomous Agents in Competition Using Event Semantics (2015) (0)
- Instituting a Risk Engine in Cognitive Radio (2014) (0)
- A tool for architecture trades and optimization for air and space based avionic systems (1999) (0)
- Cyber Security Risk Management for Connected Railroads (2020) (0)
- uSMIL: Towards secure unbreakable semantics in multimedia web services (2006) (0)
- Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract (2010) (0)
- Emergency Messages in the Commercial Mobile Alert System (2012) (0)
- A Layered Graphical Model for Cloud Forensic and Mission Impact Analysis (2018) (0)
- Session details: Invited talk (2005) (0)
- Extending ADS-B for Mixed Urban Air Traffic (2018) (0)
- Current and Future VoIP Quality of Service Techniques (2008) (0)
- A Flexible Authorization Framework (2008) (0)
- Trends and Developments in Telecommunication Security (2005) (0)
- Performance of Generating Dialogs from Ontology and Context (2018) (0)
- A HIGHLY RECOVERABLE FILESYSTEM FOR SOLID STATE DRIVES (2014) (0)
- PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing (2022) (0)
- KEYMANAGEMENTREQUIRMENTS FORPOSITIVE TRAINCONTROL COMMUNICATIONS SECURITY (2006) (0)
This paper list is powered by the following services:
Other Resources About Duminda Wijesekera
What Schools Are Affiliated With Duminda Wijesekera?
Duminda Wijesekera is affiliated with the following schools: