Research Publications
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4194
This main community comprises five sub-communities, each representing the academic contribution made by SLIIT-affiliated personnel.
Browse
2 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Open Access From short to long term: Dynamic analysis of FDI and net export in global regions(PLoS ONE, 2023-09-14) Lakshani, S; Sandaruwan, C; Fernando, C; Vidyapathirana, G; Jayathilaka, R; Munasinghe, SIt is crucial to examine the impact between foreign direct investment (FDI) and net exports (NE) for unveiling international trade dynamics, and the economic development of different geographical regions. It yields sharp insights into how FDI inflows, driven by theories such as backward linkage, export platform, and knowledge transfer, enhance a host country’s export capacity and contribute to economic growth. Moreover, studying the reciprocal linkages between FDI and NE helps recognise the aspects of domestic factors, such as productivity and the product life cycle, in attracting FDI and increasing export performance. Based on those theories, the study aims to ascertain the dynamic causality or correlation between FDI and NE across all regions with the utilisation of panel data gathered from 110 countries, considering the period from 2002 to 2020. The Wavelet coherence method is used to investigate the relationship between these variables across different frequencies and periods, followed by a Granger causality test. The findings demonstrated that FDI and NE have a significant relationship in most regions, with a bidirectional relationship between FDI and NE across all continents. The results could assist respective governments and policymakers in formulating policies related to FDI flows and offer insights into how a host country can attract more FDI and boost NE.Publication Embargo E-Secure: An Automated Behavior Based Malware Detection System for Corporate E-Mail Traffic(SAI 2018: Intelligent Computing, 2018-11-02) Thebeyanthan, K.; Achsuthan, M.; Ashok, S.; Vaikunthan, P.; Senaratne, A. N; Abeywardena, K. YOver the year’s cyber-attacks have become much more sophisticated, bringing new challenges to the cyber world. Cyber security is becoming one of the major concerns in the area of network security these days. In recent times attackers have found new ways to bypass the malware detection technologies that are used in the security domain. The static analysis of malware is no longer considered an effective method compared to the propagating rate of malware bypassing static analysis. The first step that has to be followed to protect a system is to have a deep knowledge about existing malware, different types of malware, a method to detect the malware, and the method to bypass the effects caused by the malware. E-Secure is a behavior based malware detection system for corporate e-mail traffic. This paper proposes a malware security system as a solution to detect the malicious file that is passed through the e-mail of corporate network, and externally a file uploaded separately through a website for analysis. Since signature-based methods cannot identify the sophisticated malware effectively, the dynamic analysis is used to identify the malware. The Cuckoo Sandbox plays an important role in analyzing the behavior of malware but has no feature to extract the behavior, cluster it and produce results graphically in a way that is easier to understand. An application programming interface is used to extract the behavior of the malware and to train the machines automatically by feeding the extracted behavior. K-Means algorithm is used to cluster the malware based on the same behaviors. An application programming Interface is developed to illustrate the clusters graphically. After the completion of the training process, when a new malware arrives again an application programming interface is developed to identify the type of the malware. Risk analysis is used to state the criticality of a malware. The output of the whole process can be viewed through the E-Secure web interface which helps even a junior network security administrator to understand the detected malware and how critical the malware is.
