The volatility of the stock market and news R Goonatilake, S Herath International Research Journal of Finance and Economics 3 (11), 53-65, 2007 | 77 | 2007 |
Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security R Goonatilake, A Herath, S Herath, S Herath, J Herath Journal of Computing Sciences in Colleges 23 (1), 255-263, 2007 | 42 | 2007 |
A survey of effective and efficient software testing A Mailewa, J Herath, S Herath The Midwest Instruction and Computing Symposium.(MICS), Grand Forks, ND, 2015 | 28 | 2015 |
Statistical quality control approaches to network intrusion detection R Goonatilake, R Bachnak, S Herath International Journal of Network Security & Its Applications 3 (6), 115, 2011 | 10 | 2011 |
Sinhalese morphological analysis: a step towards machine processing of sinhalese S Herath, T Ikeda, S Yokoyama, H Isahara, S Ishizaki IEEE International Workshop on Tools for Artificial Intelligence, 100,101 …, 1989 | 10 | 1989 |
Probabilistic models for anomaly detection based on usage of network traffic R Goonatilake, S Herath, A Herath Journal of Information Engineering and Applications 3 (9), 28-40, 2013 | 9 | 2013 |
Computer security learning laboratory: implementation of des and AES algorithms using spreadsheets OS Chok, S Herath MICS 2004 Proceedings, 2004 | 8 | 2004 |
A practical machine translation system from Japanese to modern Sinhalese T Ikeda, A Herath, Y Hyodo, Y Kawada, S Herath The Proceedings of the 1994 Kyoto Conference: A Festschrift for Professor …, 1995 | 8 | 1995 |
Impacts of labor and capital on manufacturing production function R Goonatilake, S Herath British Journal of Economics, Management & Trade 4 (2), 158-172, 2013 | 7 | 2013 |
E-collaboration issues in global trade, transactions, and practices R Goonatilake, S Herath, A Herath, CR Tyska European Journal of Scientific Research 34 (3), 326-336, 2009 | 7 | 2009 |
An active learning environment for intermediate computer architecture courses J Herath, S Ramnath, A Herath, S Herath Proceedings of the 2002 workshop on Computer architecture education: Held in …, 2002 | 7 | 2002 |
Machine processing of a natural language with interchangeable phrases S Herath, S Ishizaki, Y Anzai, H Aiso, T Ikeda Information sciences 66 (1-2), 139-165, 1992 | 6 | 1992 |
Analysis system for sinhalese unit structure S Herath, T Ikeda, S Ishizaki, Y Anzai, H Aiso Journal of Experimental & Theoretical Artificial Intelligence 4 (1), 29-48, 1992 | 6 | 1992 |
The extraction of symbolic postures to transfer social cues into robot PRS De Silva, T Matsumoto, SG Lambacher, AP Madurapperuma, ... Intelligent and Biosensors, 147-163, 2010 | 5 | 2010 |
An interdisciplinary accounting forensics course to improve computer science enrollments S Herath, A Herath, R Kachur, S Herath Journal of Computing Sciences in Colleges 23 (6), 74-81, 2008 | 5 | 2008 |
Relating multilingual semantic scales to a common timbre space-Part II CNW Giragama, WL Martens, S Herath, DR Wanasinghe, AM Sabbir PREPRINTS-AUDIO ENGINEERING SOCIETY, 2003 | 5 | 2003 |
Bunsetsu-based japanese-sinhalese translation system A Herath, Y Hyodo, Y Kunieda, T Ikeda, S Herath Information sciences 90 (1-4), 303-319, 1996 | 5 | 1996 |
Formalization of sinhalese morphology S Herath, T Ikeda, S Ishizaki, Y Anzai Proc. of the 40th National Congress of IPSJ. Jyouhou Syori Gakkai 1, 327-328, 1990 | 5 | 1990 |
Unsupervised approach to acquire robot joint attention P Ravindra, S De Silva, K Tadano, SG Lambacher, S Herath, M Higashi 2009 4th International Conference on Autonomous Robots and Agents, 601-606, 2009 | 4 | 2009 |
Designing computer forensics courses using case studies to enhance computer security curricula A Herath, S Herath, R Goonatilake, S Herath, J Herath Journal of Computing Sciences in Colleges 23 (1), 264-271, 2007 | 4 | 2007 |