Google Scholar: https://scholar.google.com/citations?user=tRsoo28AAAAJ&hl=en&authuser=1
ResearchGate: https://www.researchgate.net/profile/Akalanka-Mailewa
SSRN (Social Science Research Network): https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3990567
A. Journal Research Articles:
[9] Rozendaal, Kyle, and Akalanka Mailewa. "A Novel Method for Moving Laterally and Discovering Malicious Lateral Movements in Windows Operating Systems: A Case Study." Advances in Technology (August 2022), ISSN 2773-7098. (DOI:10.31357/ait.v2i3.5584)
[8] Mailewa, Akalanka, Susan Mengel, Lisa Gittner, and Hafiz Khan. "Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers." Elsevier Array (June 2022): 100236. (DOI:10.1016/j.array.2022.100236)
[7] Rozendaal, Kyle, and Akalanka Mailewa. "Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks." International Journal of Computer Applications (May 2022) 975: 8887. (DOI:10.5120/ijca2022922098)
[6] Gamnis, Steven, Matthew VanderLinden, and Akalanka Mailewa. "Analyzing Data Encryption Efficiencies for Secure Cloud Storages: A Case Study of Pcloud vs OneDrive vs Dropbox." Advances in Technology (April 2022): 79-98. (DOI:10.31357/ait.v2i1.5526)
[5] Singh, Nicholas, Kevin Bui, and Akalanka Mailewa. "Robust Efficiency Evaluation of NextCloud and GoogleCloud." Advances in Technology (March 2022): 536-545. (DOI:10.31357/ait.v1i2.5392)
[4] Kaja, Durga Venkata Sowmya, Yasmin Fatima, and Akalanka B. Mailewa. "Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques." Journal homepage: www. ijrpr. com (February 2022) ISSN 2582: 7421. (DOI:10.55248/gengpi.2022.3.2.8)
[3] Sapkota, Bhumika, and Akalanka B. Mailewa. "A Scalable Framework to Detect, Analyze, and Prevent Security Vulnerabilities in Enterprise Software-Defined Networks." Journal homepage: www. ijrpr. com (January 2022) ISSN 2582: 7421. (DOI:10.55248/gengpi.2022.3.2.1)
[2] The Impact of Smart Classrooms on The Academic Success of Sri Lankan Government School Students, by Thivanka Mailewa, Piumika Chandrasiri, Dileepa Chandrasena, Sajeevkanth Kirubhakaran, Diluksan Jesudasan,Wasantha Rajapakshe, Akalanka Mailewa. Published in the International Journal of Science& Technology Research 9(12):323-333, December 2020.
[1] Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, "Security Assurance of MongoDB in Singularity LXCs: An Elastic AND Convenient Testbed Using Linux Containers to Explore Vulnerabilities", Submitted on March 14th 2109 and accepted with minor revisions on February 13th 2020 the Cluster Computing Journal special issue on Data-center Automation, Analytics, and Control, Springer Link, February 2020
B. Conference Research Proceedings:
[16] Jairu, Pankaj, and Akalanka B. Mailewa. "Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach." In 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 606-615. IEEE, May 2022. (DOI:10.1109/eIT53891.2022.9814045)
[15] Khan, Muhammad Maaz Ali, Enow Nkongho Ehabe, and Akalanka B. Mailewa. "Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices." In 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 131-138. IEEE, May 2022. (DOI:10.1109/eIT53891.2022.9813791)
[14] Ndri, Anna, Divya Bellamkonda, and Akalanka B. Mailewa. "Applications of Block-Chain Technologies to Enhance the Security of Intrusion Detection/Prevention Systems: A Review." In Midwest Instruction and Computing Symposium (MICS), vol. 2, p. 4. April 2022.
[13] Olaosebikan, Ayodeji, Thivanka PBM Dissanayaka, and Akalanka B. Mailewa. "Security & Privacy Comparison of NextCloud vs Dropbox: A Survey." In Midwest Instruction and Computing Symposium (MICS). April 2022.
[12] Suman Thapa, Akalanka Mailewa Dissanayaka, "THE ROLE OF INTRUSION DETECTION/PREVENTION SYSTEMS IN MODERN COMPUTER NETWORKS: A REVIEW", At Midwest Instruction and Computing Symposium (MICS), Milwaukee School of Engineering and Northwestern Mutual, Milwaukee, Wisconsin, April 2020
[11] Foka Ngniteyo Arsene, Hilary Mazi, Akalanka Mailewa Dissanayaka, "THE INFLUENCE OF BLACK MARKET ACTIVITIES THROUGH DARK WEB ON THE ECONOMY: A SURVEY", At Midwest Instruction and Computing Symposium (MICS), Milwaukee School of Engineering and Northwestern Mutual, Milwaukee, Wisconsin, April 2020
[10] Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, "Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers", At the 4th International Conference on Compute and Data Analysis-2020 (ICCDA-2020) Conference, International Technological University, Silicon Valley, San Jose, CA, USA, March 2020
[09] Darknet and Black Market Activities against the Cybersecurity: A Survey on Apr 5, 2019 at Midwest Instruction and Computing Symposium (MICS) - 2019 by Mojolaoluwa Akintaro and Akalanka Mailewa Dissanayaka et. al.
[08] Security Threats/Attacks via Botnets and Botnet Detection & Prevention techniques in Computer Networks: A Review on Apr 5, 2019 at Midwest Instruction and Computing Symposium (MICS) - 2019 Mojolaoluwa Akintaro and Akalanka Mailewa Dissanayaka et. al.
[07] Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, “Dynamic and Portable Vulnerability Assessment Testbed with Linux Containers to Ensure the Security of MongoDB in Singularity LXCs”, At Supercomputing-2018 (SC18) Conference, Kay Bailey Hutchison Convention Center, Dallas, Texas, USA, November 2018
[06] Akalanka Mailewa Dissanayaka, Roshan Ramprasad Shetty, Samip Kothari, Susan Mengel, Lisa Gittner, Ravi Vadapalli, “A Review of MongoDB and Singularity Container Security in regards to HIPAA Regulations”, At ACM UCC/BDCAT Conference, University of Texas, Austin, Texas, USA, December 2017
[05] Akalanka Mailewa Dissanayaka, Roshan Ramprasad Shetty, Susan Mengel, Lisa Gittner, Ravi Vadapalli, Hafiz Khan, “Secure NoSQL Based Medical Data Processing and Retrieval: The Exposome Project”, At ACM UCC/BDCAT Conference, University of Texas, Austin, Texas, USA, December 2017
[04] Mailewa, Akalanka, Jayantha Herath, and Susantha Herath. "A Survey of Effective and Efficient Software Testing" In The Midwest Instruction and Computing Symposium. Retrieved from http://www.micsymposium.org/mics2015/ProceedingsMICS_2015/ Mailewa_2D1_41. pdf. 2015.
[03] Mailewa, Akalanka, and Jayantha Herath. "Operating Systems Learning Environment with VMware" In The Midwest Instruction and Computing Symposium. Retrieved from http://www.micsymposium.org/mics2014/ProceedingsMICS_2014/mics2014_submission_14.pdf. 2014.
[02] D.M.A.B. Mailewa, S.P.J. Perera, A. NIZAM, "Natural Angular Coordinate System for Visual Space", in Proceedings of the Peradeniya University Research Sessions (PURSE) 2010, Sri Lanka, Vol. 15, pp 633-634, December 2010
[01] D.M.A.B. Mailewa, S.P.J. Perera, C.A. Munasinghe and T.D.B. Weerasinghe, "Types and Modes Combined Algorithm for Data Encryption and Decryption", in Proceedings of the Peradeniya University Research Sessions (PURSE) 2008, Sri Lanka, Vol. 13, pp 181-182, December 2008
C. Research Posters Published:
[17] Akalanka Mailewa Dissanayaka, Mario A. Pitalua, Susan Mengel, LisaAnn Gittner and Hafiz Khan, Security Assurance of MongoDB in Singularity LXCs: An Extended Case Study with Vulnerability Assessment Testbed using Linux Containers, NSF CAC Semi-Annual Meeting, University of Arizona, April 2019
[16] Akalanka Mailewa Dissanayaka, Mario A. Pitalua, Brittanny Tu, Susan Mengel, LisaAnn Gittner and Hafiz Khan, Dynamic & portable vulnerability assessment testbed with Linux containers to ensure the security of MongoDB in Singularity LXCs, NSF CAC Semi-Annual Meeting, University of North Texas (UNT), Denton, Texas, October 2018
[15] Jaffer Samad, Brittany Tu, Mario A. Pitalua, Akalanka Mailewa Dissanayaka, Susan Mengel, LisaAnn Gittner and Hafiz Khan, PROVIDING MEANING THROUGH BIG DATA, NSF CAC Semi-Annual Meeting, University of North Texas (UNT), Denton, Texas, October 2018
[14] Mario A. Pitalua, Akalanka Mailewa Dissanayaka, Brittanny Tu, Susan Mengel, LisaAnn Gittner and Hafiz Khan, Mining Similarities Among Disease Factors using Spatial Statistics, NSF CAC Semi-Annual Meeting, University of North Texas (UNT), Denton, Texas, October 2018
[13] Mario A. Pitalua, Akalanka Mailewa Dissanayaka, Susan Mengel, LisaAnn Gittner and Hafiz Khan, Linking Disease Factors to Legislation Documents, NSF CAC Semi-Annual Meeting, University of North Texas (UNT), Denton, Texas, October 2018
[12] Akalanka Mailewa Dissanayaka, Samip Kothari, Suhas Bacchu, Mario Alberto Pital˜ Aoa Rodr˜Aguez, Susan Mengel, Ravi Vadapalli, Analysis of MongoDB and Singularity Container Security in regards to HIPAA Regulations, SPARK2018 Conference, Texas Tech University, April 2018
[11] Aakriti Pyakurel, Mario A. Pitalua, Akalanka Mailewa Dissanayaka, Samip Kothari, Suhas Bacchu, Arun kumar Jegarkal, Brittanny Tu, Pradip Lamsal, Susan Mengel, Hafiz Khan, Ravi Vadapalli and LisaAnn Gittner, The Exposome Project: A Transdisciplinary Approach to Systems Thinking, SPARK-2018 Conference, Texas Tech University, April 2018
[10] Samip Kothari, Akalanka Mailewa Dissanayaka, Mario Alberto Pital˜ Aoa Rodr˜ Aguez, Susan Mengel, LisaAnn Gittner, MongoDB and Singularity Container Application And Security in Regards to HIPAA Regulations, NSF CAC SemiAnnual Meeting, University of Arizona, April 2018
[09] Akalanka Mailewa Dissanayaka, Susan A. Mengel, Power Utilization Analysis of IoT Sensor Networks Under Several Attacks in RPL Routing Protocol, TTU poster competition, Texas Tech University, April 2018
[08] Akalanka Mailewa Dissanayaka, Roshan Ramprasad Shetty, Samip Kothari, Suhas Bacchu, Rishika Akavaram, Mario Pitalua, Aakriti Pyakurel, Susan Mengel, LisaAnn Gittner, Hafiz Khan and Ravi Vadappali, Analysis of MongoDB and Singularity Container Security in regards to HIPAA Regulations, NSF CAC Semi-Annual Meeting, Texas Tech University, October 2017
[07] Mario Alberto Pital˜ Aoa Rodr˜Aguez, Kevin Gittner, Yuan Li, Akalanka Mailewa Dissanayaka, Daniel Medina Sada, Aakriti Pyakurel, Roshan Ramprasad Shetty, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, The Impact of Quantiles on Variable Diffusion, NSF CAC Semi-Annual Meeting, Texas Tech University, October 2017
[06] Akalanka Mailewa Dissanayaka, Aakriti Pyakurel, Vibhuti Gupta, Yuan Li, Mario A. Pitalua Rodriguez, Bukunmi Oyedeji, Kevin Gittner, Ukamaka Enwerem, Roshan Ramprasad Shetty, Daniel Medina Sada, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, Private Data Security surrounded by, and interacting with, Big Data Analytics, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
[05] Aakriti Pyakurel, Akalanka Mailewa Dissanayaka, Vibhuti Gupta, Yuan Li, Mario A. Pitalua Rodriguez, Bukunmi Oyedeji, Kevin Gittner, Ukamaka Enwerem, Roshan Ramprasad Shetty, Daniel Medina Sada, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, A Trans disciplinary Preliminary Approach to Systems Thinking for Diseases Risk Prevention, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
[04] Kevin Gittner, Aakriti Pyakurel, Vibhuti Gupta, Yuan Li, Mario A. Pitalua Rodriguez, Bukunmi Oyedeji, Akalanka Mailewa Dissanayaka, Ukamaka Enwerem, Roshan Ramprasad Shetty, Daniel Medina Sada, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, Model Discovery for Risk Prediction, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
[03] Yuan Li, Aakriti Pyakurel, Vibhuti Gupta, Akalanka Mailewa Dissanayaka, Mario A. Pitalua Rodriguez, Bukunmi Oyedeji, Kevin Gittner, Ukamaka Enwerem, Roshan Ramprasad Shetty, Daniel Medina Sada, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, Relational Analysis Through Graph Data Reduction Technique, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
[02] Mario A. Pitalua Rodriguez, Aakriti Pyakurel, Vibhuti Gupta, Yuan Li, Akalanka Mailewa Dissanayaka, Bukunmi Oyedeji, Kevin Gittner, Ukamaka Enwerem, Roshan Ramprasad Shetty, Daniel Medina Sada, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, Visualizing Disease Patterns Along I-20 Cardiovascular Disease from EI Paso to Shreveport, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
[01] Daniel Medina Sada, Aakriti Pyakurel, Vibhuti Gupta, Yuan Li, Mario A. Pitalua Rodriguez, Bukunmi Oyedeji, Kevin Gittner, Ukamaka Enwerem, Roshan Ramprasad Shetty, Akalanka Mailewa Dissanayaka, Susan Mengel, Hafiz Khan, Ravi Vadappali and LisaAnn Gittner, Tracking Health Issues with Twitter, NSF CAC Semi-Annual Meeting, University of Arizona, April 2017
D. Research/Project Reports (Undergraduate and Graduate) AY2021-2022:
Report-01: "Security in Software Defined Network: A Comprehensive Review" by Sai Krishna Dhulipalla, Jayanth Mani Alla, Maddala Kushal Kumar, & Akalanka Mailewa, Spring 2022 [IA612].
Report-02: “Detecting and Protecting Against Data Integrity Attacks in Data Centers” by Selma Biddle, Adow Ali, Munirah Ibrahim, & Akalanka Mailewa, Spring 2022 [IA612].
Report-03: “Recent Advances of Network Anomaly Detection Techniques and Mechanisms” by Gavin Dutche, Okonkwo D. Chukwuemeka, Salome Jerry Pantuvo, & Akalanka Mailewa, Spring 2022 [IA612].
Report-04: “IoT Vulnerabilities Influencing Data Security through Black Market A survey” by Ritesh Thapa, Fortune Edenomon, Grishav Pokharel, & Akalanka Mailewa, Spring 2022 [IA612].
Report-05: “Detecting and protecting against data integrity attacks in data centers” by Gavin Dutcher, Koku Azianyo, & Akalanka Mailewa, Spring 2022 [IA612].
Report-06: “Multi-factor Authentication and its Relationship to Social Media” by Marissa Kremers, Isaiah Ryman, & Akalanka Mailewa, Spring 2022 [CSCI415].
Report-07: “Facial Recognition Using a Twin Network Neural Network” by Ben Olsen, Blake McGowan, & Akalanka Mailewa, Spring 2022 [CSCI415].
Report-08: “Fake Packet Injection To Prevent Message Interception Through The Network” by Kenji Vang, Cheng Xiong, & Akalanka Mailewa, Spring 2022 [CSCI415].
Report-09: “To What Extent Can You Extract Detailed Data, Information, Knowledge or, Wisdom About Different Network Protocols from The Wireshark Source Code?” by Khalid Alghamdi, William Munnich, & Akalanka Mailewa, Spring 2022 [CNA431].
Report-10: “To What Degree Does Discord Expose Its Users to Remote Compromise” by Jace Hendricks, Emilia Bukingolts, & Akalanka Mailewa, Spring 2022 [CNA431].
Report-11: “An Analysis of Google Chrome Design” by Jonathan Haseth, Jeramy Gitzel, & Akalanka Mailewa, Spring 2022 [CNA431].
Report-12: “VULNERABILITIES WITHIN GOOGLE CHROME BROWSER EXTENSIONS” by Chapin Johnson, Sharveen Param, & Akalanka Mailewa, Spring 2022 [CNA431].
Report-13: “Password Recovery Mechanisms” by Reese Benson, Mitchell Gabel, & Akalanka Mailewa, Spring 2022 [CNA431].
Report-14: “Buffer Overflows: It’s Types, Why they are important and How to solve them” by Swarnim Gauli & Akalanka Mailewa, Spring 2022 [CNA431].
Report-15: “METHODS FOR THE PREVENTION, DETECTION, AND REMOVAL OF SOFTWARE SECURITY VULNERABILITIES” by Khalid Alghamdi, William Munnich, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-16: “Network Penetration Testing Overview” by Manikanta Sai Krishna Chillimunta, Sharveen Paramiswaran, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-17: “Recent Advances in Penetration Testing” by Student Group-05, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-18: “Vulnerabilities Influencing Data Security through the Black Market” by Ivan Gorbatenko, Ryan Glascock, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-19: “Machine Learning Based DDoS Attack Detection” by Aoran Shen, Zihan Ji, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-20: “Review Of Network Vulnerability Discovery Techniques” by Julie Lapine, Okonkwo D. Chukwuemeka, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-21: “Recent advances in vulnerabilities analysis” by Rongfei Zhang, Yankaiqi Li, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-22: “DDos Attack Detection using Machine Learning Techniques” by Nicky Rathe, Roger Massmann, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-23: “Security in Internet of Things” by Chentao wang, Yixiang Zhang, & Akalanka Mailewa, Spring 2022 [CNA430].
Report-24: "IoT vulnerabilities influencing data security through Black Market" by Isse Abdia, Diana Nnenna Ikeomumub, Kenneth Junior Amoah, & Akalanka Mailewa, Fall 2021 [IA612].
Report-25: “Application of Blockchain to Intrusion Detection System and Intrusion Prevention Systems” by Anna Ndri, Divya Bellamkonda, & Akalanka Mailewa, Fall 2021 [IA612].
Report-26: “METHODS FOR THE PREVENTION, DETECTION AND REMOVAL OF NETWORK SECURITY VULNERABILITIES” by Musa Gassama, Nirdesh Karki, & Akalanka Mailewa, Fall 2021 [IA612].
Report-27: “Robust efficiency evaluation of Next Cloud and Google” by Nicholas Singh, Kevin Bui, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-28: “Towards a vertical lock in file systems” by Ryan Glascock, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-29: “Nextcloud vs Consumer Cloud Solutions” by Emilia Bukingolts, Jon Haseth, Jeramy Gitzel, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-30: “Lack of Confidentiality in the Digital Age Telegram as the Way of Improving Private Data Exchange” by Ivan Gorbatenko, Julie Lapine, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-31: “A method for evaluating Nextcloud performance with linear regression equations” by Aoran Shen, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-32: “A Simple method of encrypting files based on Gröbner Base, a distributed cloud storage model, implemented in a local programming language framework and in a public wire store” by Yankaiqi Li, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-33: “Comparison of Nextcloud with Composed End-to-End Solutions” by Brooke VanderLinden, Lilly Majeski, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-34: “Comparison of Nextcloud with composed end-to-end solutions” by John Tholen, James Vang, & Akalanka Mailewa, Fall 2021 [CNA438/538].
Report-35: “Increase security against backdoors for end-to-end encryption with third-party software” by Rongfei Zhang, Chentao Wang, & Akalanka Mailewa, Fall 2021 [CNA438/538].