


default search action
Arunan Sivanathan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c11]Savindu Wannigama, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked Assets. WoWMoM 2025: 39-44 - 2024
- [i2]Savindu Wannigama, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
Unveiling Behavioral Transparency of Protocols Communicated by IoT Networked Assets (Full Version). CoRR abs/2404.07408 (2024) - 2023
- [c10]Hugo Sullivan, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
Programmable Active Scans Controlled by Passive Traffic Inference for IoT Asset Characterization. NOMS 2023: 1-6 - 2022
- [c9]Arman Pashamokhtari, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili:
PicP-MUD: Profiling Information Content of Payloads in MUD Flows for IoT Devices. WoWMoM 2022: 521-526 - 2021
- [c8]Jay Anand, Arunan Sivanathan, Ayyoob Hamza, Hassan Habibi Gharakheili
:
PARVP: passively assessing risk of vulnerable passwords for HTTP authentication in networked cameras. DAI-SNAC@CoNEXT 2021: 10-16 - 2020
- [b1]Arunan Sivanathan:
IoT Behavioral Monitoring via Network Traffic Analysis. University of New South Wales, Sydney, Australia, 2020 - [j4]Arunan Sivanathan
, Hassan Habibi Gharakheili
, Vijay Sivaraman
:
Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling. IEEE Internet Things J. 7(8): 7295-7309 (2020) - [j3]Arunan Sivanathan
, Hassan Habibi Gharakheili
, Vijay Sivaraman
:
Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning. IEEE Trans. Netw. Serv. Manag. 17(1): 60-74 (2020) - [i1]Arunan Sivanathan:
IoT Behavioral Monitoring via Network Traffic Analysis. CoRR abs/2001.10632 (2020)
2010 – 2019
- 2019
- [j2]Hassan Habibi Gharakheili
, Arunan Sivanathan, Ayyoob Hamza, Vijay Sivaraman:
Network-Level Security for the Internet of Things: Opportunities and Challenges. Computer 52(8): 58-62 (2019) - [j1]Arunan Sivanathan
, Hassan Habibi Gharakheili
, Franco Loi, Adam Radford, Chamith Wijenayake
, Arun Vishwanath
, Vijay Sivaraman
:
Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics. IEEE Trans. Mob. Comput. 18(8): 1745-1759 (2019) - [c7]Sharat Chandra Madanapalli, Arunan Sivanathan, Hassan Habibi Gharakheili
, Vijay Sivaraman, Santosh Patil, Byju Pularikkal:
Modeling and Monitoring Wi-Fi Calling Traffic in Enterprise Networks Using Machine Learning. LCN 2019: 222-225 - [c6]Arunan Sivanathan, Hassan Habibi Gharakheili
, Vijay Sivaraman:
Inferring IoT Device Types from Network Behavior Using Unsupervised Clustering. LCN 2019: 230-233 - 2017
- [c5]Arunan Sivanathan, Franco Loi, Hassan Habibi Gharakheili
, Vijay Sivaraman:
Experimental evaluation of cybersecurity threats to the smart-home. ANTS 2017: 1-6 - [c4]Franco Loi, Arunan Sivanathan, Hassan Habibi Gharakheili
, Adam Radford, Vijay Sivaraman:
Systematically Evaluating Security and Privacy for Consumer IoT Devices. IoT S&P@CCS 2017: 1-6 - [c3]Arunan Sivanathan, Daniel Sherratt, Hassan Habibi Gharakheili
, Adam Radford, Chamith Wijenayake
, Arun Vishwanath, Vijay Sivaraman:
Characterizing and classifying IoT traffic in smart cities and campuses. INFOCOM Workshops 2017: 559-564 - [c2]Minzhao Lyu
, Daniel Sherratt, Arunan Sivanathan, Hassan Habibi Gharakheili
, Adam Radford, Vijay Sivaraman:
Quantifying the reflective DDoS attack capability of household IoT devices. WISEC 2017: 46-51 - 2016
- [c1]Arunan Sivanathan, Daniel Sherratt, Hassan Habibi Gharakheili
, Vijay Sivaraman, Arun Vishwanath:
Low-cost flow-based security solutions for smart-home IoT devices. ANTS 2016: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint