default search action
Asangi Jayatilaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j6]Orvila Sarker, Asangi Jayatilaka, Sherif Haggag, Chelsea Liu, Muhammad Ali Babar:
A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. J. Syst. Softw. 208: 111899 (2024) - 2023
- [j5]Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu:
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. Comput. Secur. 131: 103313 (2023) - 2022
- [j4]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. IEEE Access 10: 57525-57554 (2022) - [j3]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
Software security patch management - A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 144: 106771 (2022) - [j2]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. Proc. ACM Hum. Comput. Interact. 6(CSCW2): 1-29 (2022) - 2017
- [j1]Asangi Jayatilaka, Damith Chinthana Ranasinghe:
Real-time fluid intake gesture recognition based on batteryless UHF RFID technology. Pervasive Mob. Comput. 34: 146-156 (2017)
Conference and Workshop Papers
- 2023
- [c10]Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu:
Personalized Guidelines for Design, Implementation and Evaluation of Anti-Phishing Interventions. ESEM 2023: 1-12 - [c9]Vladislav Pikulin, Daiki Kubo, Kaveesha Nissanka, Sadeeptha Bandara, Muhammad A. Shamsiemon, Arissha Yasmin, Asangi Jayatilaka, Anuradha Madugalla, Tanjila Kanij:
Towards Developer-Centered Secure Coding Training. ASEW 2023: 24-31 - 2022
- [c8]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. ASE 2022: 7:1-7:13 - 2021
- [c7]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. ICIS 2021 - [c6]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A grounded theory of the role of coordination in software security patch management. ESEC/SIGSOFT FSE 2021: 793-805 - 2019
- [c5]Asangi Jayatilaka, Quoc Hung Dang, Shengjian Jammy Chen, Renuka Visvanathan, Christophe Fumeaux, Damith Chinthana Ranasinghe:
Designing batteryless wearables for hospitalized older people. UbiComp 2019: 91-95 - [c4]Michael Chesser, Asangi Jayatilaka, Renuka Visvanathan, Christophe Fumeaux, Alanson P. Sample, Damith Chinthana Ranasinghe:
Super Low Resolution RF Powered Accelerometers for Alerting on Hospitalized Patient Bed Exits. PerCom 2019: 1-10 - 2016
- [c3]Asangi Jayatilaka, Yang Su, Damith Chinthana Ranasinghe:
HoTAAL: Home of social things meet ambient assisted living. PerCom Workshops 2016: 1-3 - [c2]Asangi Jayatilaka, Damith Chinthana Ranasinghe:
Towards unobtrusive real-time fluid intake monitoring using passive UHF RFID. IEEE RFID 2016: 74-77 - 2015
- [c1]Cally Guerin, Asangi Jayatilaka, Paul R. Calder, Alistair McCulloch, Damith Chinthana Ranasinghe:
Why Don't More ICT Students Do PhDs? ACE 2015: 73-80
Informal and Other Publications
- 2024
- [i10]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Why People Still Fall for Phishing Emails: An Empirical Investigation into How Users Make Email Response Decisions. CoRR abs/2401.13199 (2024) - 2023
- [i9]Orvila Sarker, Sherif Haggag, Asangi Jayatilaka, Chelsea Liu:
Personalized Guidelines for Design, Implementation and Evaluation of Anti-phishing Interventions. CoRR abs/2311.12827 (2023) - 2022
- [i8]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
Why, How and Where of Delays in Software Security Patch Management: An Empirical Investigation in the Healthcare Sector. CoRR abs/2202.09016 (2022) - [i7]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. CoRR abs/2209.01518 (2022) - 2021
- [i6]Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A Grounded Theory of the Role of Coordination in Software Security Patch Management. CoRR abs/2106.03458 (2021) - [i5]Asangi Jayatilaka, Nalin Asanka Gamagedara Arachchilage, Muhammad Ali Babar:
Falling for Phishing: An Empirical Investigation into People's Email Response Behaviors. CoRR abs/2108.04766 (2021) - [i4]Asangi Jayatilaka, Nathan Beu, Irina Baetu, Mansooreh Zahedi, Muhammad Ali Babar, Laura Hartley, Winston Lewinsmith:
Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline. CoRR abs/2112.06356 (2021) - [i3]Liuyue Jiang, Asangi Jayatilaka, Mehwish Nasim, Marthie Grobler, Mansooreh Zahedi, Muhammad Ali Babar:
Systematic Literature Review on Cyber Situational Awareness Visualizations. CoRR abs/2112.10354 (2021) - 2020
- [i2]Michael Chesser, Asangi Jayatilaka, Renuka Visvanathan, Christophe Fumeaux, Alanson P. Sample, Damith Chinthana Ranasinghe:
Super Low Resolution RF Powered Accelerometers for Alerting on Hospitalized Patient Bed Exits. CoRR abs/2003.08530 (2020) - [i1]Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
Software Security Patch Management - A Systematic Literature Review of Challenges, Approaches, Tools and Practices. CoRR abs/2012.00544 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-06 22:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint