GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection QP Nguyen, KW Lim, DM Divakaran, KH Low, MC Chan IEEE CNS, 2019 | 212* | 2019 |
DEFT: A distributed IoT fingerprinting technique V Thangavelu, DM Divakaran, R Sairam, SS Bhunia, M Gurusamy IEEE Internet of Things Journal 6 (1), 940-952, 2019 | 173 | 2019 |
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan, Y Lu, Y Si, F Zhang, ... USENIX Security Symposium 2021, 2021 | 140* | 2021 |
Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic I Nevat, DM Divakaran, SG Nagarajan, P Zhang, L Su, LL Ko, VLL Thing IEEE/ACM Transactions on Networking, 2018 | 81 | 2018 |
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach R Liu, Y Lin, X Yang, SH Ng, DM Divakaran, Jin Song Dong USENIX Security Symposium 2022, 2022 | 68 | 2022 |
A feature-ranking framework for IoT device classification BA Desai, DM Divakaran, I Nevat, GW Peter, M Gurusamy 2019 11th International Conference on Communication Systems & Networks …, 2019 | 52 | 2019 |
HIPCAL: State of the Art of OS and Network virtualization solutions for Grids P Primet, JP Gelas, O Mornard, DM Divakaran, P Bozonnet, M Jan, ... Sep 14, 38, 2007 | 52* | 2007 |
Detection of SYN flooding attacks using linear prediction analysis DM Divakaran, HA Murthy, TA Gonsalves 2006 14th IEEE International Conference on Networks 1, 1-6, 2006 | 47 | 2006 |
ADEPT: Detection and Identification of Correlated Attack-Stages in IoT Networks KLK Sudheera, DM Divakaran, RP Singh, M Gurusamy IEEE Internet of Things Journal, 2021 | 46 | 2021 |
SLIC: Self-learning intelligent classifier for network traffic DM Divakaran, L Su, YS Liau, VLL Thing Computer Networks 91, 283-297, 2015 | 45 | 2015 |
D-Fence: A Flexible, Efficient, and Comprehensive Phishing Email Detection System J Lee, F Tang, P Ye, F Abbasi, P Hay, DM Divakaran IEEE EuroS&P 2021, 2021 | 43 | 2021 |
Towards flexible guarantees in clouds: Adaptive bandwidth allocation and pricing DM Divakaran, M Gurusamy IEEE Transactions on Parallel and Distributed Systems 26 (6), 1754-1764, 2014 | 41 | 2014 |
An online integrated resource allocator for guaranteed performance in data centers DM Divakaran, TN Le, M Gurusamy IEEE Transactions on Parallel and Distributed Systems 25 (6), 1382-1392, 2013 | 39 | 2013 |
DIDA: Distributed In-Network Defense Architecture Against Amplified Reflection DDoS Attacks XZ Khooi, L Csikor, DM Divakaran, MS Kang IEEE NetSoft 2020, 2020 | 38 | 2020 |
Evidence gathering for network security and forensics DM Divakaran, KW Fok, I Nevat, VLL Thing Digital Investigation 20, S56-S65, 2017 | 35 | 2017 |
FACT: A framework for authentication in cloud-based IP traceback L Cheng, DM Divakaran, AWK Ang, WY Lim, VLL Thing IEEE Transactions on Information Forensics and Security 12 (3), 604-616, 2016 | 35 | 2016 |
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review DM Divakaran, A Oest IEEE Security and Privacy, 2022 | 34 | 2022 |
Insider threat detection and its future directions LL Ko, DM Divakaran, YS Liau, VLL Thing International Journal of Security and Networks 12 (3), 168-187, 2017 | 34 | 2017 |
Opportunistic piggyback marking for IP traceback L Cheng, DM Divakaran, WY Lim, VLL Thing IEEE Transactions on Information Forensics and Security 11 (2), 273-288, 2015 | 33 | 2015 |
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten QP Nguyen, R Oikawa, DM Divakaran, MC Chan, BKH Low ACM AsiaCCS, 2022 | 32* | 2022 |