default search action
Dinil Mon Divakaran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Walid A. Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma, Khaled A. Harras:
DiffPerf: Toward Performance Differentiation and Optimization With SDN Implementation. IEEE Trans. Netw. Serv. Manag. 21(1): 1012-1031 (2024) - [c51]Yongwoo Oh, Michael Yiqing Hu, Xin Zhe Khooi, Jehyun Lee, Dinil Mon Divakaran, Min Suk Kang:
IoTell: A Privacy-Preserving Protocol for Large-scale Monitoring of IoT Security Status. CCGridW 2024: 9-17 - [c50]Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das:
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. COMSNETS 2024: 430-432 - [c49]Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy:
ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification. NOMS 2024: 1-9 - [c48]Kanav Sabharwal, Soundarya Ramesh, Jingxian Wang, Dinil Mon Divakaran, Mun Choon Chan:
Enhancing LoRa Reception with Generative Models: Channel-Aware Denoising of LoRaPHY Signals. SenSys 2024: 507-520 - [i17]Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das:
Mitigating Bias in Machine Learning Models for Phishing Webpage Detection. CoRR abs/2401.08363 (2024) - [i16]Dinil Mon Divakaran, Sai Teja Peddinti:
LLMs for Cyber Security: New Opportunities. CoRR abs/2404.11338 (2024) - [i15]Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das:
From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks. CoRR abs/2407.20361 (2024) - [i14]Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran:
Multimodal Large Language Models for Phishing Webpage Detection and Identification. CoRR abs/2408.05941 (2024) - [i13]Philipp Gysel, Candid Wüest, Kenneth Nwafor, Otakar Jasek, Andrey Ustyuzhanin, Dinil Mon Divakaran:
EagleEye: Attention to Unveil Malicious Event Sequences from Provenance Graphs. CoRR abs/2408.09217 (2024) - 2023
- [j18]Cha Hwan Song, Xin Zhe Khooi, Dinil Mon Divakaran, Mun Choon Chan:
DySO: Enhancing application offload efficiency on programmable switches. Comput. Networks 224: 109607 (2023) - [j17]Akshaye Shenoi, Prasanna Karthik Vairam, Kanav Sabharwal, Jialin Li, Dinil Mon Divakaran:
iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications. Proc. Priv. Enhancing Technol. 2023(2): 206-220 (2023) - [c47]Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran:
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations. ESORICS (3) 2023: 162-182 - [i12]Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran:
Attacking logo-based phishing website detectors with adversarial perturbations. CoRR abs/2308.09392 (2023) - [i11]Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy:
ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification. CoRR abs/2310.08036 (2023) - [i10]Levente Csikor, Dinil Mon Divakaran:
The Evolution of DNS Security and Privacy. CoRR abs/2312.04577 (2023) - 2022
- [j16]Dinil Mon Divakaran, Adam Oest:
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. IEEE Secur. Priv. 20(5): 86-95 (2022) - [c46]Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low:
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten. AsiaCCS 2022: 351-363 - [c45]P. C. Amogh, Dinil Mon Divakaran, Mohan Gurusamy:
Inferring Autoscale Information from NFV MANO for Launching Attacks - An Experimental Study with Cloudified 5G. CIoT 2022: 173-179 - [c44]Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:
SIERRA: Ranking Anomalous Activities in Enterprise Networks. EuroS&P 2022: 44-59 - [c43]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. ICDCN 2022: 175-187 - [c42]Kushan Sudheera Kalupahana Liyanage, Tian Zixu, Dinil Mon Divakaran, Mun Choon Chan, Mohan Gurusamy:
APEX: Characterizing Attack Behaviors from Network Anomalies. IPCCC 2022: 207-216 - [c41]Cha Hwan Song, Xin Zhe Khooi, Dinil Mon Divakaran, Mun Choon Chan:
Revisiting Application Offloads on Programmable Switches. IFIP Networking 2022: 1-9 - [c40]Purnima Murali Mohan, Vivek Balachandran, Ong Ze Quan, Jas Pang Ze Xin, Dinil Mon Divakaran:
NFT-Merit: An NFT-based Module Credit Management System on Ethereum Blockchain. TALE 2022: 472-476 - [c39]Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, Jin Song Dong:
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach. USENIX Security Symposium 2022: 1633-1650 - [d1]Kushan Sudheera Kalupahana Liyanage, Dinil Mon Divakaran, Rhishi Pratap Singh, Mohan Gurusamy:
NSS Mirai Dataset. IEEE DataPort, 2022 - [i9]Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low:
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten. CoRR abs/2202.13585 (2022) - [i8]Jehyun Lee, Farren Tang, Phyo May Thet, Desmond Yeoh, Mitch Rybczynski, Dinil Mon Divakaran:
SIERRA: Ranking Anomalous Activities in Enterprise Networks. CoRR abs/2203.16802 (2022) - [i7]Dinil Mon Divakaran, Adam Oest:
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review. CoRR abs/2205.07411 (2022) - 2021
- [j15]Kushan Sudheera Kalupahana Liyanage, Dinil Mon Divakaran, Rhishi Pratap Singh, Mohan Gurusamy:
ADEPT: Detection and Identification of Correlated Attack Stages in IoT Networks. IEEE Internet Things J. 8(8): 6591-6607 (2021) - [j14]Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy:
Cost-Aware Feature Selection for IoT Device Classification. IEEE Internet Things J. 8(14): 11052-11064 (2021) - [c38]Levente Csikor, Himanshu Singh, Min Suk Kang, Dinil Mon Divakaran:
Privacy of DNS-over-HTTPS: Requiem for a Dream? EuroS&P 2021: 252-271 - [c37]Jehyun Lee, Farren Tang, Pingxiao Ye, Fahim Abbasi, Phil Hay, Dinil Mon Divakaran:
D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System. EuroS&P 2021: 578-597 - [c36]Xin Zhe Khooi, Levente Csikor, Jialin Li, Dinil Mon Divakaran:
In-Network Applications: Beyond Single Switch Pipelines. NetSoft 2021: 1-8 - [c35]Xin Zhe Khooi, Levente Csikor, Jialin Li, Min Suk Kang, Dinil Mon Divakaran:
Revisiting Heavy-Hitter Detection on Commodity Programmable Switches. NetSoft 2021: 79-87 - [c34]Walid A. Y. Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma:
DiffPerf: An In-Network Performance Optimization for Improving User-Perceived QoE. NetSoft 2021: 288-292 - [c33]Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, Jin Song Dong:
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. USENIX Security Symposium 2021: 3793-3810 - [i6]Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai:
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes. CoRR abs/2101.04338 (2021) - [i5]Jehyun Lee, Min Suk Kang, Dinil Mon Divakaran, Phyo May Thet, Videet Singhai, Jun Seung You:
A Step Towards On-Path Security Function Outsourcing. CoRR abs/2110.00250 (2021) - 2020
- [c32]Xin Zhe Khooi, Levente Csikor, Dinil Mon Divakaran, Min Suk Kang:
DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks. NetSoft 2020: 277-281 - [c31]Xin Zhe Khooi, Levente Csikor, Min Suk Kang, Dinil Mon Divakaran:
In-network defense against AR-DDoS attacks. SIGCOMM Posters and Demos 2020: 18-20 - [c30]Xin Zhe Khooi, Levente Csikor, Min Suk Kang, Dinil Mon Divakaran:
Towards in-network time-decaying aggregates for heavy-hitter detection. SIGCOMM Posters and Demos 2020: 88-90 - [i4]Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy:
Cost-aware Feature Selection for IoT Device Classification. CoRR abs/2009.01368 (2020) - [i3]Levente Csikor, Vipul Ujawane, Dinil Mon Divakaran:
On the Feasibility and Enhancement of the Tuple Space Explosion Attack against Open vSwitch. CoRR abs/2011.09107 (2020) - [i2]Walid A. Y. Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma:
DiffPerf: Towards Performance Differentiation and Optimization with SDN Implementation. CoRR abs/2012.03293 (2020)
2010 – 2019
- 2019
- [j13]Vijayanand Thangavelu, Dinil Mon Divakaran, Rishi Sairam, Suman Sankar Bhunia, Mohan Gurusamy:
DEFT: A Distributed IoT Fingerprinting Technique. IEEE Internet Things J. 6(1): 940-952 (2019) - [c29]Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan:
GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. CNS 2019: 91-99 - [c28]Bharat Atul Desai, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy:
A feature-ranking framework for IoT device classification. COMSNETS 2019: 64-71 - [c27]Levente Csikor, Dinil Mon Divakaran, Min Suk Kang, Attila Korösi, Balázs Sonkoly, Dávid Haja, Dimitrios P. Pezaros, Stefan Schmid, Gábor Rétvári:
Tuple space explosion: a denial-of-service attack against a software packet classifier. CoNEXT 2019: 292-304 - [i1]Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan:
GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection. CoRR abs/1903.06661 (2019) - 2018
- [j12]Ido Nevat, Dinil Mon Divakaran, Sai Ganesh Nagarajan, Pengfei Zhang, Le Su, Li Ling Ko, Vrizlynn L. L. Thing:
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic. IEEE/ACM Trans. Netw. 26(1): 131-144 (2018) - [c26]Le Su, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Privacy preserving IP traceback. ISBA 2018: 1-8 - [c25]Fok Kar Wai, Wee-Yong Lim, Dinil Mon Divakaran, Vrizlynn L. L. Thing:
Predicting vulnerability discovery rate using past versions of a software. SOLI 2018: 220-225 - 2017
- [j11]Dinil Mon Divakaran, Li Ling Ko, Le Su, Vrizlynn L. L. Thing:
REX: Resilient and efficient data structure for tracking network flows. Comput. Networks 118: 37-53 (2017) - [j10]Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing:
Evidence gathering for network security and forensics. Digit. Investig. 20 Supplement: S56-S65 (2017) - [j9]Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing:
Insider threat detection and its future directions. Int. J. Secur. Networks 12(3): 168-187 (2017) - [j8]Long Cheng, Dinil Mon Divakaran, Aloysius Wooi Kiak Ang, Wee-Yong Lim, Vrizlynn L. L. Thing:
FACT: A Framework for Authentication in Cloud-Based IP Traceback. IEEE Trans. Inf. Forensics Secur. 12(3): 604-616 (2017) - [c24]Leena Deodhar, Dinil Mon Divakaran, Mohan Gurusamy:
Analysis of Privacy Leak on Twitter. GLOBECOM 2017: 1-6 - [c23]Runa Barik, Dinil Mon Divakaran, Michael Welzl:
Characterizing the effects of TCP's initial window. INFOCOM Workshops 2017: 886-891 - [c22]Sharon Ezekiel, Dinil Mon Divakaran, Mohan Gurusamy:
Dynamic attack mitigation using SDN. ITNAC 2017: 1-6 - 2016
- [j7]Long Cheng, Dinil Mon Divakaran, Wee-Yong Lim, Vrizlynn L. L. Thing:
Opportunistic Piggyback Marking for IP Traceback. IEEE Trans. Inf. Forensics Secur. 11(2): 273-288 (2016) - [c21]Purnima Murali Mohan, Dinil Mon Divakaran, Mohan Gurusamy:
Proportional bandwidth sharing using Bayesian inference in SDN-based data centers. ICC 2016: 1-6 - [c20]Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing:
Accurate in-network file-type classification. SG-CRC 2016: 139-146 - 2015
- [j6]Dinil Mon Divakaran, Le Su, Yung Siang Liau, Vrizlynn L. L. Thing:
SLIC: Self-Learning Intelligent Classifier for network traffic. Comput. Networks 91: 283-297 (2015) - [j5]Dinil Mon Divakaran, Soumya Hegde, Raksha Srinivas, Mohan Gurusamy:
Dynamic resource allocation in hybrid optical-electrical datacenter networks. Comput. Commun. 69: 40-49 (2015) - [j4]Dinil Mon Divakaran, Mohan Gurusamy:
Towards Flexible Guarantees in Clouds: Adaptive Bandwidth Allocation and Pricing. IEEE Trans. Parallel Distributed Syst. 26(6): 1754-1764 (2015) - 2014
- [j3]Dinil Mon Divakaran, Mohan Gurusamy, Mathumitha Sellamuthu:
Bandwidth allocation with differential pricing for flexible demands in data center networks. Comput. Networks 73: 84-97 (2014) - [j2]Dinil Mon Divakaran, Tho Ngoc Le, Mohan Gurusamy:
An Online Integrated Resource Allocator for Guaranteed Performance in Data Centers. IEEE Trans. Parallel Distributed Syst. 25(6): 1382-1392 (2014) - [c19]Raksha Srinivas, Soumya Hegde, Dinil Mon Divakaran, Mohan Gurusamy:
Virtual Network Embedding in Hybrid Datacenters with Dynamic Wavelength Grouping. CloudCom 2014: 905-910 - [c18]Wee Kim Tan, Dinil Mon Divakaran, Mohan Gurusamy:
Uniform price auction for allocation of dynamic cloud bandwidth. ICC 2014: 2944-2949 - [c17]Soumya Hegde, Raksha Srinivas, Dinil Mon Divakaran, Mohan Gurusamy:
Dynamic embedding of virtual networks in hybrid optical-electrical datacenters. ICCCN 2014: 1-8 - [c16]Runa Barik, Dinil Mon Divakaran:
Development and experimentation of TCP initial window function. NOF 2014: 1-5 - 2013
- [c15]Dinil Mon Divakaran, Mohan Gurusamy:
Probabilistic-bandwidth guarantees with pricing in data-center networks. ICC 2013: 3716-3720 - [c14]Purnima Murali Mohan, Dinil Mon Divakaran, Mohan Gurusamy:
Performance study of TCP flows with QoS-supported OpenFlow in data center networks. ICON 2013: 1-6 - [c13]Runa Barik, Dinil Mon Divakaran:
Evolution of TCP's initial window size. LCN 2013: 500-508 - 2012
- [j1]Dinil Mon Divakaran:
A spike-detecting AQM to deal with elephants. Comput. Networks 56(13): 3087-3098 (2012) - [c12]Mohan Gurusamy, Tho Ngoc Le, Dinil Mon Divakaran:
An integrated resource allocation scheme for multi-tenant data-center. LCN 2012: 496-504 - [c11]Runa Barik, Dinil Mon Divakaran:
TCP Initial Window: A Study. WWIC 2012: 290-297 - 2011
- [c10]Reena Singh, Dinil Mon Divakaran, Timothy A. Gonsalves:
Taking rural BPO to new heights: An ACM for distributed and secure document sharing. IEEE ANTS 2011: 1-6 - [c9]Dinil Mon Divakaran, Eitan Altman, Pascale Vicat-Blanc Primet:
Size-Based Flow-Scheduling Using Spike-Detection. ASMTA 2011: 331-345 - [c8]Dinil Mon Divakaran:
Using spikes to deal with elephants. IPCCC 2011: 1-8 - 2010
- [c7]Fabienne Anhalt, Dinil Mon Divakaran, Pascale Vicat-Blanc Primet:
A virtual switch architecture for hosting virtual networks on the Internet. HPSR 2010: 26-31 - [c6]Dinil Mon Divakaran, Fabienne Anhalt, Eitan Altman, Pascale Vicat-Blanc Primet:
Size-based flow scheduling in a CICQ switch. HPSR 2010: 57-62 - [c5]Dinil Mon Divakaran, Giovanna Carofiglio, Eitan Altman, Pascale Vicat-Blanc Primet:
A Flow Scheduler Architecture. Networking 2010: 122-134
2000 – 2009
- 2009
- [c4]Sebastien Soudan, Dinil Mon Divakaran, Eitan Altman, Pascale Vicat-Blanc Primet:
Equilibrium in Size-Based Scheduling Systems. ASMTA 2009: 234-248 - [c3]Dinil Mon Divakaran, Eitan Altman, Georg Post, Ludovic Noirie, Pascale Vicat-Blanc Primet:
Analysis of the Effects of XLFrames in a Network. Networking 2009: 364-377 - 2006
- [c2]Dinil Mon Divakaran, Hema A. Murthy, Timothy A. Gonsalves:
Detection of Syn Flooding Attacks using Linear Prediction Analysis. ICON 2006: 1-6 - [c1]Dinil Mon Divakaran, Hema A. Murthy, Timothy A. Gonsalves:
Traffic Modeling and Classification Using Packet Train Length and Packet Train Size. IPOM 2006: 1-12
Coauthor Index
aka: Mohan Gurusamy
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint