DEFT: A distributed IoT fingerprinting technique V Thangavelu, DM Divakaran, R Sairam, SS Bhunia, M Gurusamy IEEE Internet of Things Journal 6 (1), 940-952, 2019 | 134 | 2019 |
GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection QP Nguyen, KW Lim, DM Divakaran, KH Low, MC Chan IEEE CNS, 2019 | 126* | 2019 |
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing IEEE/ACM Transactions on Networking, 2018 | 71 | 2018 |
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan, Y Lu, Y Si, F Zhang, ... USENIX Security Symposium 2021, 2021 | 55* | 2021 |
HIPCAL: State of the Art of OS and Network virtualization solutions for Grids P Primet, JP Gelas, O Mornard, DM Divakaran, P Bozonnet, M Jan, ... Sep 14, 38, 2007 | 51* | 2007 |
Detection of SYN flooding attacks using linear prediction analysis DM Divakaran, HA Murthy, TA Gonsalves 2006 14th IEEE International Conference on Networks 1, 1-6, 2006 | 46 | 2006 |
A feature-ranking framework for IoT device classification BA Desai, DM Divakaran, I Nevat, GW Peter, M Gurusamy 2019 11th International Conference on Communication Systems & Networks …, 2019 | 42 | 2019 |
Towards flexible guarantees in clouds: Adaptive bandwidth allocation and pricing DM Divakaran, M Gurusamy IEEE Transactions on Parallel and Distributed Systems 26 (6), 1754-1764, 2014 | 39 | 2014 |
SLIC: Self-learning intelligent classifier for network traffic DM Divakaran, L Su, YS Liau, VLL Thing Computer Networks 91, 283-297, 2015 | 37 | 2015 |
An online integrated resource allocator for guaranteed performance in data centers DM Divakaran, TN Le, M Gurusamy IEEE Transactions on Parallel and Distributed Systems 25 (6), 1382-1392, 2013 | 35 | 2013 |
FACT: A framework for authentication in cloud-based IP traceback L Cheng, DM Divakaran, AWK Ang, WY Lim, VLL Thing IEEE Transactions on Information Forensics and Security 12 (3), 604-616, 2016 | 34 | 2016 |
Opportunistic piggyback marking for IP traceback L Cheng, DM Divakaran, WY Lim, VLL Thing IEEE Transactions on Information Forensics and Security 11 (2), 273-288, 2015 | 31 | 2015 |
Evidence gathering for network security and forensics DM Divakaran, KW Fok, I Nevat, VLL Thing Digital Investigation 20, S56-S65, 2017 | 30 | 2017 |
Performance study of TCP flows with QoS-supported OpenFlow in data center networks PM Mohan, DM Divakaran, M Gurusamy 2013 19th IEEE International Conference on Networks (ICON), 1-6, 2013 | 28 | 2013 |
Insider threat detection and its future directions LL Ko, DM Divakaran, YS Liau, VLL Thing International Journal of Security and Networks 12 (3), 168-187, 2017 | 26 | 2017 |
ADEPT: Detection and Identification of Correlated Attack-Stages in IoT Networks KLK Sudheera, DM Divakaran, RP Singh, M Gurusamy IEEE Internet of Things Journal, 2021 | 23 | 2021 |
DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks XZ Khooi, L Csikor, DM Divakaran, MS Kang IEEE NetSoft 2020, 2020 | 20 | 2020 |
Tuple Space Explosion: A Denial-of-Service Attack Against a Software Packet Classifier L Csikor, DM Divakaran, MS Kang, A Korosi, B Sonkoly, D Haja, ... ACM CoNEXT, 2019 | 20* | 2019 |
Traffic modeling and classification using packet train length and packet train size DM Divakaran, HA Murthy, TA Gonsalves Autonomic Principles of IP Operations and Management: 6th IEEE International …, 2006 | 17 | 2006 |
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes GS Poh, DM Divakaran, HW Lim, J Ning, A Desai arXiv preprint arXiv:2101.04338, 2021 | 16* | 2021 |