Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ajantha Herath is active.

Publication


Featured researches published by Ajantha Herath.


First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05) | 2005

Computer forensics, information security and law: a case study

Ajantha Herath; Susantha Herath; Prasantha Samarasinghe; Jayantha Herath

Providing security and assurance to information systems and communications is one of the highest national priorities. It is our task to prepare computer information system security professionals with current security and assurance information to achieve this objective. To meet this urgent need, the faculty must have the knowledge and skills to be taught in the classroom. For several semesters, we have been developing information system security curriculum with a computer forensics course for the students. Active participation in real life security problems is a great opportunity to learn the subject matter. This paper describes one of our positive experiences.


International Journal of Advanced Computer Science and Applications | 2013

A Project Based CS/IS-1 Course with an Active Learning Environment

Suvineetha Herath; Ajantha Herath; Mohammed A.R. Siddiqui; Khuzaima Ah. El-Jallad

High level programming languages use system defined data types and the user defined data types in computations. We have developed a project-based CS/IS-1 course to substitute the traditional lecture based classroom to help students design and use at least two user defined data types in their computations to solve real world problems. Abstract data types and basic programming constructs are introduced efficiently to the students in an active learning environment using games. To assess and evaluate the changes made we distributed the course module among our students and other instructors. This paper describes our experience in developing the project based active learning environment.


Journal of Computing Sciences in Colleges | 2007

Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security

Rohitha Goonatilake; Ajantha Herath; Suvineetha Herath; Susantha Herath; Jayantha Herath


Journal of Computing Sciences in Colleges | 2008

Cryptographic algorithms to spatial circuit transformation in an active learning module to enhance the information assurance and security curriculum

Ajantha Herath; Rohitha Goonatilake; Jayantha Herath; Susantha Herath


Journal of Computing Sciences in Colleges | 2007

Mathematical modeling of cyber attacks: a learning module to enhance undergraduate security curricula

Ajantha Herath; Suvineetha Herath; Rohitha Goonatilake; Jayantha Herath; Richard Stockton


Journal of Computing Sciences in Colleges | 2008

An interdisciplinary accounting forensics course to improve computer science enrollments

Suvineetha Herath; Ajantha Herath; Robert L. Kachur; Susantha Herath


Archive | 1995

A Practical Machine Translation System from Japanese to Modern Sinhalese

Ajantha Herath; Yasuaki Hyodo; Y. Kawada; 尚志 池田; Susantha Herath


International Journal of Computing and Digital Systems | 2013

Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts

Ajantha Herath; Yousif Al-Bastaki; Suvineetha Herath


Journal of Computing Sciences in Colleges | 2007

Designing computer forensics courses using case studies to enhance computer security curricula

Ajantha Herath; Suvineetha Herath; Rohitha Goonatilake; Susantha Herath; Jayantha Herath


Journal of Computing Sciences in Colleges | 2007

A study of information privacy and data sanitization problems: student paper

D. Roubos; L. Palmieri; R. L. Kachur; Susantha Herath; Ajantha Herath; David Constantino

Collaboration


Dive into the Ajantha Herath's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Susantha Herath

St. Cloud State University

View shared research outputs
Top Co-Authors

Avatar

Jayantha Herath

St. Cloud State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

D. Roubos

Richard Stockton College of New Jersey

View shared research outputs
Top Co-Authors

Avatar

L. Palmieri

Richard Stockton College of New Jersey

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

R. L. Kachur

Richard Stockton College of New Jersey

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge