Research Publications
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4194
This main community comprises five sub-communities, each representing the academic contribution made by SLIIT-affiliated personnel.
Browse
2 results
Search Results
Item Embargo Digital Pathways in Smart Tourism: A Systematic Literature Review on Key Drivers of Travelers' Decision-Making(Institute of Electrical and Electronics Engineers Inc., 2025) Karunaratna, D; Senevirathne, C; Fernando, K; Peksha, P; Jayasinghe, P; Samarakkody, TThis study systematically investigates how digital components including information reliability, accessibility, cost efficiency, virtual reality and mobile adoption influence travelers' preferences in smart tourism. To do this, the study utilizes the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) framework to aggregate evidence from across the globe - showing both regional technology disparities, and a variety of different methodological approaches. In developed countries, technology integration is quite strong while developing regions face constraints of finance and infrastructure. These tech-centric factors are important to traveler decision-making, as indicated by the review; however, greater coverage of understudied regions is needed. The resulting insights provide the basis for targeted and holistic solutions to improve tourism services for the benefit of policymakers, industry practitioners and academics.Publication Open Access Development of Cyber Threat Intelligence System in a SOC Environment for Real Time Environment(Department of Computing and Information Systems, Faculty of Applied Sciences, Sabaragamuwa University of Sri Lanka, 2021-02-24) Varatharaj, A; Rupasinghe, P. L; Liyanapathirana, CNow a days, Information Communication Technology (ICT) plays an important role in the world. In IT, Cyber Security holds a vast place. Cyber Threat Intelligence (CTI) leads the significant place within Cyber Security, as many Cyber Threats need to be faced every day by a particular organization. Security Operation Center (SOC) helps to monitor and analyze an organization’s security position in Real Time. This paper proposes about the Cyber Threat Intelligence framework in a SOC Environment in Real Time. The proposed framework contains of three layers, which are built above Security Onion. The Layer 1 comprises of input data from online and offline sources. In Layer 2, implemented two components namely Filter data and Cut down data, which receive the data from Layer 1. Finally, in Layer 3 delivers a detailed report. As the input for the Layer 1, Financial Datasets is used. These Financial Datasets, which helps in order to detect the Financial Frauds. Machine Learning is used to train the model. By implementing CTI System in an organization, it helps to gain predictive output regarding the upcoming threats. Also, it helps to ensure the reputation of an organization by establishing trust between the users. Helps to increase the number of customers to an organization. The above are the advantages gained by a particular organization by having a CTI System.
