Dinil Mon Divakaran

Orcid: 0000-0001-8706-432X

According to our database1, Dinil Mon Divakaran authored at least 79 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DiffPerf: Toward Performance Differentiation and Optimization With SDN Implementation.
IEEE Trans. Netw. Serv. Manag., February, 2024

EagleEye: Attention to Unveil Malicious Event Sequences from Provenance Graphs.
CoRR, 2024

Multimodal Large Language Models for Phishing Webpage Detection and Identification.
CoRR, 2024

From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks.
CoRR, 2024

LLMs for Cyber Security: New Opportunities.
CoRR, 2024

Enhancing LoRa Reception with Generative Models: Channel-Aware Denoising of LoRaPHY Signals.
Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems, 2024

ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Mitigating Bias in Machine Learning Models for Phishing Webpage Detection.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2023
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications.
Proc. Priv. Enhancing Technol., April, 2023

DySO: Enhancing application offload efficiency on programmable switches.
Comput. Networks, April, 2023

The Evolution of DNS Security and Privacy.
CoRR, 2023

Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review.
IEEE Secur. Priv., 2022

Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach.
Proceedings of the 31st USENIX Security Symposium, 2022

NFT-Merit: An NFT-based Module Credit Management System on Ethereum Blockchain.
Proceedings of the IEEE International Conference on Teaching, 2022

Revisiting Application Offloads on Programmable Switches.
Proceedings of the IFIP Networking Conference, 2022

APEX: Characterizing Attack Behaviors from Network Anomalies.
Proceedings of the IEEE International Performance, 2022

A Step Towards On-Path Security Function Outsourcing.
Proceedings of the ICDCN '22: 23rd International Conference on Distributed Computing and Networking, Delhi, AA, India, January 4, 2022

SIERRA: Ranking Anomalous Activities in Enterprise Networks.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5G.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks.
IEEE Internet Things J., 2021

Cost-Aware Feature Selection for IoT Device Classification.
IEEE Internet Things J., 2021

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021

Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages.
Proceedings of the 30th USENIX Security Symposium, 2021

Revisiting Heavy-Hitter Detection on Commodity Programmable Switches.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

In-Network Applications: Beyond Single Switch Pipelines.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

DiffPerf: An In-Network Performance Optimization for Improving User-Perceived QoE.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Privacy of DNS-over-HTTPS: Requiem for a Dream?
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
DiffPerf: Towards Performance Differentiation and Optimization with SDN Implementation.
CoRR, 2020

On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch.
CoRR, 2020

Towards in-network time-decaying aggregates for heavy-hitter detection.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

In-network defense against AR-DDoS attacks.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
DEFT: A Distributed IoT Fingerprinting Technique.
IEEE Internet Things J., 2019

Tuple space explosion: a denial-of-service attack against a software packet classifier.
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019

A feature-ranking framework for IoT device classification.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic.
IEEE/ACM Trans. Netw., 2018

Predicting vulnerability discovery rate using past versions of a software.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

Privacy preserving IP traceback.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
FACT: A Framework for Authentication in Cloud-Based IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2017

Insider threat detection and its future directions.
Int. J. Secur. Networks, 2017

Evidence gathering for network security and forensics.
Digit. Investig., 2017

REX: Resilient and efficient data structure for tracking network flows.
Comput. Networks, 2017

Dynamic attack mitigation using SDN.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Characterizing the effects of TCP's initial window.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Analysis of Privacy Leak on Twitter.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Opportunistic Piggyback Marking for IP Traceback.
IEEE Trans. Inf. Forensics Secur., 2016

Accurate in-network file-type classification.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Proportional bandwidth sharing using Bayesian inference in SDN-based data centers.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Towards Flexible Guarantees in Clouds: Adaptive Bandwidth Allocation and Pricing.
IEEE Trans. Parallel Distributed Syst., 2015

Dynamic resource allocation in hybrid optical-electrical datacenter networks.
Comput. Commun., 2015

SLIC: Self-Learning Intelligent Classifier for network traffic.
Comput. Networks, 2015

2014
An Online Integrated Resource Allocator for Guaranteed Performance in Data Centers.
IEEE Trans. Parallel Distributed Syst., 2014

Bandwidth allocation with differential pricing for flexible demands in data center networks.
Comput. Networks, 2014

Development and experimentation of TCP initial window function.
Proceedings of the 2014 International Conference and Workshop on the Network of the Future, 2014

Dynamic embedding of virtual networks in hybrid optical-electrical datacenters.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Uniform price auction for allocation of dynamic cloud bandwidth.
Proceedings of the IEEE International Conference on Communications, 2014

Virtual Network Embedding in Hybrid Datacenters with Dynamic Wavelength Grouping.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
Evolution of TCP's initial window size.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Performance study of TCP flows with QoS-supported OpenFlow in data center networks.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Probabilistic-bandwidth guarantees with pricing in data-center networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
A spike-detecting AQM to deal with elephants.
Comput. Networks, 2012

TCP Initial Window: A Study.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

An integrated resource allocation scheme for multi-tenant data-center.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Using spikes to deal with elephants.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Size-Based Flow-Scheduling Using Spike-Detection.
Proceedings of the Analytical and Stochastic Modeling Techniques and Applications, 2011

Taking rural BPO to new heights: An ACM for distributed and secure document sharing.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
A Flow Scheduler Architecture.
Proceedings of the NETWORKING 2010, 2010

Size-based flow scheduling in a CICQ switch.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

A virtual switch architecture for hosting virtual networks on the Internet.
Proceedings of the 11th IEEE International Conference on High Performance Switching and Routing, 2010

2009
Analysis of the Effects of XLFrames in a Network.
Proceedings of the NETWORKING 2009, 2009

Equilibrium in Size-Based Scheduling Systems.
Proceedings of the Analytical and Stochastic Modeling Techniques and Applications, 2009

2006
Traffic Modeling and Classification Using Packet Train Length and Packet Train Size.
Proceedings of the Autonomic Principles of IP Operations and Management, 2006

Detection of Syn Flooding Attacks using Linear Prediction Analysis.
Proceedings of the 14th IEEE International Conference on Networks, 2006


  Loading...