Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Dinil Mon Divakaran"'
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2023:206-220
IoT devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring the network traffic. Recent research works have shown that a network attacker with a trained machine lear
Autor:
Dinil Mon Divakaran, Adam Oest
Publikováno v:
IEEE Security & Privacy. 20:86-95
Phishing attacks trick victims into disclosing sensitive information. To counter rapidly evolving attacks, we must explore machine learning and deep learning models leveraging large-scale data. We discuss models built on different kinds of data, alon
Autor:
Mohan Gurusamy, Mun Choon Chan, Dinil Mon Divakaran, Zixu Tian, Kushan Sudheera Kalupahana Liyanage
Publikováno v:
2022 IEEE International Performance, Computing, and Communications Conference (IPCCC).
Networks regularly face various threats and attacks that manifest in their communication traffic. Recent works proposed unsupervised approaches, e.g., using a variational autoencoder, that are not only effective in detecting anomalies in network traf
Publikováno v:
IEEE Internet of Things Journal. 8:11052-11064
Classification of IoT devices into different types is of paramount importance, from multiple perspectives, including security and privacy aspects. Recent works have explored machine learning techniques for fingerprinting (or classifying) IoT devices,
Publikováno v:
2022 IFIP Networking Conference (IFIP Networking).
Autor:
Rhishi Pratap Singh, Dinil Mon Divakaran, Mohan Gurusamy, Kalupahana Liyanage Kushan Sudheera
Publikováno v:
IEEE Internet of Things Journal. 8:6591-6607
The fast-growing Internet-of-Things (IoT) market has opened up a large threat landscape, given the wide deployment of IoT devices in both consumer and commercial spaces. Attacks on IoT devices generally consist of multiple stages and are dispersed sp
Publikováno v:
Computer Networks. 224:109607
Publikováno v:
2022 5th Conference on Cloud and Internet of Things (CIoT).
IoT devices are vulnerable to different kinds of threats and attacks. The devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring the network traffic. Recent researc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6eaae2f98c201ce79e78664659490fef
https://doi.org/10.36227/techrxiv.19235742.v1
https://doi.org/10.36227/techrxiv.19235742.v1
Publikováno v:
EuroS&P
Phishing continues to be a major security concern for organizations around the globe. Past works proposed classifiers to detect phishing emails; however many of them are based on rules, whereas others are typically standalone models focusing on one s