Faculty of Computing

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    An investigation into dynamic TLPs for smartphone communication: To facilitate timed response in way finding for vision impaired people
    (IEEE, 2013-12-11) De Silva, D. H; Murray, I
    A reliable, high speed and efficient data transfer method is a very important factor in real time Way-finding systems since it requires information with very low latency to discover paths, avoid dangerous situations, identified changes in existing maps and alternative routes. This research will develop models and methods to facilitate bounded timing with minimal latency for way-finding application for vision impaired people. As a result of analyzing the requirements for Way-finding applications, it was noted that some typical behaviours involve relatively small amount of data transfer through networks. Existing Transport Layer Protocols (TLP) are not ideal for providing such requirements. This research investigates existing TLPs and proposes modifications / extensions to facilitate demands in Way-finding applications and will implement the Dynamic TLP to incorporate both reliable data transfers with high efficiency as well as frequent data transfers which do not require reliability.
  • Thumbnail Image
    PublicationEmbargo
    Platform Independent Browser Forensic Tool for Advanced Analysis of Artifacts and Case Management
    (2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Dissanayake, D.; Rajakaruna, S.; Ranasinghe, D.; Wijesooriya, A.; Jayakody, A.; Rajapaksha, S.
    Abstract—A web browser is a major attack vector which cybercriminals utilize to land in an environment. The evidence related to the malicious browsing activities can be found in the host which gives valuable information related to the case. These digital footprints involve history, cookies, bookmarks, saved credentials and downloads etc. This paper presents a sophisticated tool aiding the conventional manual investigation process from evidence collection to the final v e rdict b y a u tomating h u man dependent functions, resulting a fast and unbiased analysis of browser forensic artifacts. This tool states its unique value over the existing tools by working operating systems independently, collecting all browsing evidence including deleted artifacts and encrypted saved credentials, automatically analysing the reputation of the extracted evidence, integrating evidence collected from different web browsers into a single timeline, and correlating the adjacent distrustful events inside and outside the host. Eventually, this tool calculates a browsing reputation scorecard and creates a profile for the host, condensing the findings g a thered t h roughout the investigation. The paper presents another important methodology to predict the future browsing reputation score based on the past browsing patterns. Furthermore, multiple cases management feature and dashboard provide a concise overview of overall findings to the forensic investigator.