<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>2024</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2802</link>
<description/>
<pubDate>Tue, 07 Apr 2026 13:58:12 GMT</pubDate>
<dc:date>2026-04-07T13:58:12Z</dc:date>
<item>
<title>Zero Trust Architecture Framework To Secure &amp; Mitigate Organizational Threats</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2873</link>
<description>Zero Trust Architecture Framework To Secure &amp; Mitigate Organizational Threats
Kuruppu, Tiran
Zero Trust has been very hot topic within the industry, specifically because the industry is &#13;
changing rapidly and there is a lot more remote working happening, so zero trust Architecture &#13;
is a policy where it’s very important to give least privilege access to all users out there, so &#13;
verifying all the users, applications &amp; devices on the network before allowing them to any &#13;
critical assets in organizations. This is becoming increasingly important because of network &#13;
boundaries have been changing and people are connecting the organization network from &#13;
various locations, users and applications are spanning multiple products and services across &#13;
multiple different locations and this why it makes it more and more important to focus on zero &#13;
trust. Zero trust architecture (ZTA) processes every request and gives the subject a resource &#13;
without depending on implicit confidence, in contrast to perimeter-based architecture, which &#13;
assumes that any subject inside the wall (i.e., inside the pre-defined perimeter) is trustworthy. &#13;
This document introduces the ZT and ZTA concepts based on NIST Special Publication SP800&#13;
207. Also, the difficulties, procedures, and factors to think about when switching from the old &#13;
architecture to ZTA are given and discussed.
</description>
<pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dlib.iit.ac.lk/xmlui/handle/123456789/2873</guid>
<dc:date>2024-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Cyberbullying Detection Based on Sinhala Language Context on Social Media</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2872</link>
<description>Cyberbullying Detection Based on Sinhala Language Context on Social Media
Peiris, Sarani
"Cyberbullying has become a pervasive issue on social networking sites, leading to severe negative impacts on victims. Despite its prevalence, a comprehensive technological solution to address this global problem remains elusive. In response, this study proposes an automated approach to identify cyberbullying in Sinhala language text, including emojis, using a deep learning approach. The primary objective is to provide a means for relevant parties to take preemptive action against cyberbullying instances before they escalate.&#13;
Utilizing a Convolutional Neural Network (CNN), the technical solution involves training the model on a dataset consisting of Sinhala language text extracted from social media platforms. The CNN architecture comprises multiple layers, including convolutional and pooling layers, designed to extract relevant features from the text data and classify it based on hate level.&#13;
Evaluation of the proposed approach yielded promising results, with the CNN achieving an accuracy rate of 79%. This performance metric indicates the model's effectiveness in accurately identifying instances of cyberbullying in Sinhala language text, thereby offering a potential solution to mitigate its harmful effects in society."
</description>
<pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dlib.iit.ac.lk/xmlui/handle/123456789/2872</guid>
<dc:date>2024-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Enhanced Online Payment Fraud Detection Using Hybrid Machine Learning Mechanism</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2871</link>
<description>Enhanced Online Payment Fraud Detection Using Hybrid Machine Learning Mechanism
Gunarathna, Sachitha
"The rush in digital transactions has underscored the importance to develop accurate and&#13;
trustworthy mechanism for detecting online payment fraud. In response to these challenges,&#13;
author propose an innovative hybrid machine learning approach. The methodology integrates&#13;
different algorithms to enhance the accuracy and resilience of fraud detection systems. The&#13;
process initiates with the curation and preprocessing of a comprehensive dataset containing&#13;
both genuine and fraudulent transaction data. Subsequent feature engineering extracts crucial&#13;
insights from raw data, augmenting the model's discerning capacity. Random Forest classifier,&#13;
Gradient Boosting classifier, AdaBoost classifier, and K-Nearest Neighbors classifier (KNN&#13;
classifier) were judiciously chosen to develop an ensemble of model as an output of the&#13;
research.&#13;
&#13;
The main point of the methodology lies in the ensemble model creation phase, where&#13;
predictions from individual models merge through voting mechanism leveraging the unique&#13;
strengths of each classifier algorithm. This merging results in a more accurate and adaptable&#13;
fraud detection system. Critical cross-validation and hyperparameter tuning are used to&#13;
meticulously refine the ensemble model, ensuring optimal performance without overfitting.&#13;
&#13;
The ensemble model demonstrated superior performance, significantly improving fraud&#13;
detection rates while reducing false positives, thereby enhancing user experience. In summary,&#13;
the proposed hybrid machine learning approach offers a strong and precise solution for online&#13;
payment fraud detection. By using the strengths of various classifier algorithms, it strengthened&#13;
accuracy and establishing a robust defence against the evolving landscape of digital payment&#13;
fraud strategies.&#13;
&#13;
Subject Descriptors:&#13;
• Computing methodologies → Artificial intelligence → Machine learning → Hybrid&#13;
learning approaches&#13;
• Applied computing → E-commerce → Security and privacy in e-commerce → Fraud&#13;
detection&#13;
&#13;
Keywords: Machine learning, K-Nearest Neighbors classifier, Random Forest, Logistic&#13;
Regression, Ensemble model, Voting, Cross-validation, Hyperparameter tuning"
</description>
<pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dlib.iit.ac.lk/xmlui/handle/123456789/2871</guid>
<dc:date>2024-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Increasing the Efficiency of Security Operation Centers Using Automations</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2870</link>
<description>Increasing the Efficiency of Security Operation Centers Using Automations
Senanayake, Ruvimal
"Organisations need SOCs to combat the growing volume and complexity of cyber threats. Data overload, alert weariness, and rapid response might reduce SOC efficiency. This study&#13;
investigates SOC performance to address inefficiency. An in-depth research shows that manual processes, limited scalability, and the inability to prioritise critical signals impair SOC threat identification and mitigation. The recommended intentional SOC workflow automation to address these challenges. We streamline tasks, analyse data, and respond to incidents in real time using AI, machine learning, and robotic process automation. The proposed automated method frees SOC analysts to focus on strategic decision-making and threat hunting. Our automation solutions are tested in case studies and simulations to improve SOC efficiency."
</description>
<pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://dlib.iit.ac.lk/xmlui/handle/123456789/2870</guid>
<dc:date>2024-01-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
