Mohamed Ali Kâafar

Orcid: 0000-0003-2714-0276

Affiliations:
  • Macquarie University, Faculty of Science and Engineering, Australia
  • CSIRO Data61, Sydney, Australia
  • NICTA, Australia


According to our database1, Mohamed Ali Kâafar authored at least 210 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Use of cryptography in malware obfuscation.
J. Comput. Virol. Hacking Tech., 2024

SPGNN-API: A Transferable Graph Neural Network for Attack Paths Identification and Autonomous Mitigation.
IEEE Trans. Inf. Forensics Secur., 2024

Investigating Evasive Techniques in SMS Spam Filtering: A Comparative Analysis of Machine Learning Models.
IEEE Access, 2024

2023
Local Differentially Private Fuzzy Counting in Stream Data Using Probabilistic Data Structures.
IEEE Trans. Knowl. Data Eng., August, 2023

Unintended Memorization and Timing Attacks in Named Entity Recognition Models.
Proc. Priv. Enhancing Technol., April, 2023

DDoD: Dual Denial of Decision Attacks on Human-AI Teams.
IEEE Pervasive Comput., 2023

Practical, Private Assurance of the Value of Collaboration.
CoRR, 2023

An analysis of scam baiting calls: Identifying and extracting scam stages and scripts.
CoRR, 2023

On the Adversarial Inversion of Deep Biometric Representations.
CoRR, 2023

A longitudinal study of the top 1% toxic Twitter profiles.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Fast IDentity Online with Anonymous Credentials (FIDO-AC).
Proceedings of the 32nd USENIX Security Symposium, 2023

Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study.
Proceedings of the IEEE Secure Development Conference, 2023

Distance Maximization and Defences on Deep Hashing Based Image Retrieval.
Proceedings of the IEEE International Conference on Knowledge Graph, 2023

On mission Twitter Profiles: A Study of Selective Toxic Behavior.
Proceedings of the IEEE International Conference on Big Data, 2023

Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users.
Proceedings of the IEEE International Conference on Big Data, 2023

Privacy-Preserving Record Linkage for Cardinality Counting.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency Wallet Apps.
Proceedings of the Applied Cryptography and Network Security, 2023

Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Do Auto-Regressive Models Protect Privacy? Inferring Fine-Grained Energy Consumption From Aggregated Model Parameters.
IEEE Trans. Serv. Comput., 2022

Fairness and Cost Constrained Privacy-Aware Record Linkage.
IEEE Trans. Inf. Forensics Secur., 2022

A Differentially Private Framework for Deep Learning With Convexified Loss Functions.
IEEE Trans. Inf. Forensics Secur., 2022

DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022

How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Proc. Priv. Enhancing Technol., 2022

SoK: Use of Cryptography in Malware Obfuscation.
IACR Cryptol. ePrint Arch., 2022

An Empirical Analysis of SMS Scam Detection Systems.
CoRR, 2022

Local Differentially Private Fuzzy Counting in Stream Data using Probabilistic Data Structure.
CoRR, 2022

Privacy Preserving Release of Mobile Sensor Data.
CoRR, 2022

5G-Enabled Pseudonymity for Cooperative Intelligent Transportation System.
CoRR, 2022

A Study of Third-party Resources Loading on Web.
CoRR, 2022

A deep dive into the consistently toxic 1% of Twitter.
CoRR, 2022

A First Look at Android Apps' Third-Party Resources Loading.
Proceedings of the Network and System Security - 16th International Conference, 2022

Towards a Zero-Trust Micro-segmentation Network Security Strategy: An Evaluation Framework.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Tracking and Personalization.
Modern Socio-Technical Perspectives on Privacy, 2022

2021
The Cost of Privacy in Asynchronous Differentially-Private Machine Learning.
IEEE Trans. Inf. Forensics Secur., 2021

The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services.
Proc. Priv. Enhancing Technol., 2021

Analyzing security issues of android mobile health and medical applications.
J. Am. Medical Informatics Assoc., 2021

Empirical Security and Privacy Analysis of Mobile Symptom Checking Applications on Google Play.
CoRR, 2021

Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants.
CoRR, 2021

All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks.
CoRR, 2021

Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-domain Routing via Blockchain.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

A Blockchain-enabled Anonymous-yet- Traceable Distributed Key Generation.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
P4Mobi: A Probabilistic Privacy-Preserving Framework for Publishing Mobility Datasets.
IEEE Trans. Veh. Technol., 2020

Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes.
ACM Trans. Priv. Secur., 2020

Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Trans. Priv. Secur., 2020

Not All Attributes are Created Equal: dX -Private Mechanisms for Linear Queries.
Proc. Priv. Enhancing Technol., 2020

Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms.
Proc. Priv. Enhancing Technol., 2020

Differentially Private Release of Datasets using Gaussian Copula.
J. Priv. Confidentiality, 2020

Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020

Unsupervised Learning for security of Enterprise networks by micro-segmentation.
CoRR, 2020

Predicting Performance of Asynchronous Differentially-Private Learning.
CoRR, 2020

Data and Model Dependencies of Membership Inference Attack.
CoRR, 2020

Modelling and Quantifying Membership Information Leakage in Machine Learning.
CoRR, 2020

The Value of Collaboration in Convex Machine Learning with Differential Privacy.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

On the Resilience of Biometric Authentication Systems against Random Inputs.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Feature-Based Adversarial Attacks Against Machine Learnt Mobile Malware Detectors.
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020

Who Let the<i>DOGS</i>Out: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

BlockJack: Blocking IP Prefix Hijacker in Inter-Domain Routing.
Proceedings of the CoNEXT'20: Proceedings of the Student Workshop, Barcelona, 2020

Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning.
Proceedings of the CCSW'20, 2020

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car.
IEEE Veh. Technol. Mag., 2019

uStash: A Novel Mobile Content Delivery System for Improving User QoE in Public Transport.
IEEE Trans. Mob. Comput., 2019

Optimized deployment of drone base station to improve user experience in cellular networks.
J. Netw. Comput. Appl., 2019

Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

On Inferring Training Data Attributes in Machine Learning Models.
CoRR, 2019

The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT.
CoRR, 2019

Averaging Attacks on Bounded Perturbation Algorithms.
CoRR, 2019

Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula.
CoRR, 2019

Fast privacy-preserving network function outsourcing.
Comput. Networks, 2019

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading.
Proceedings of the World Wide Web Conference, 2019

Private Continual Release of Real-Valued Data Streams.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

A Longitudinal Analysis of Online Ad-Blocking Blacklists.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Access Types Effect on Internet Video Services and Its Implications on CDN Caching.
IEEE Trans. Circuits Syst. Video Technol., 2018

Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking.
Proc. Priv. Enhancing Technol., 2018

On the Fundamental Characteristics of Ultra-Dense Small Cell Networks.
IEEE Netw., 2018

The Web for Underpowered Mobile Devices: Lessons Learned from Google Glass.
IEEE Internet Comput., 2018

Differentially Private Data Generative Models.
CoRR, 2018

d<sub>X</sub>-Private Mechanisms for Linear Queries.
CoRR, 2018

A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated.
CoRR, 2018

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018

Incognito: A Method for Obfuscating Web Data.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

2017
Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis.
ACM Trans. Web, 2017

Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Characterizing and Modeling User Behavior in a Large-Scale Mobile Live Streaming System.
IEEE Trans. Circuits Syst. Video Technol., 2017

Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning.
Proc. Priv. Enhancing Technol., 2017

Optimized Deployment of Autonomous Drones to Improve User Experience in Cellular Networks.
CoRR, 2017

A First Look at Ad Blocking Apps on Google Play.
CoRR, 2017

WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017

Graph Based Recommendations: From Data Representation to Feature Extraction and Application.
CoRR, 2017

More Flexible Differential Privacy: The Application of Piecewise Mixture Distributions in Query Release.
CoRR, 2017

On the Privacy of the Opal Data Release: A Response.
CoRR, 2017

Differentially Private Release of Public Transport Data: The Opal Use Case.
CoRR, 2017

A deep dive into location-based communities in social discovery networks.
Comput. Commun., 2017

Crowd-Cache: Leveraging on spatio-temporal correlation in content popularity for mobile networking in proximity.
Comput. Commun., 2017

AC-PROT: An Access Control Model to Improve Software-Defined Networking Security.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study.
Proceedings of the 2017 IFIP Networking Conference, 2017

A first look at mobile Ad-Blocking apps.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

BehavioCog: An Observation Resistant Authentication Scheme.
Proceedings of the Financial Cryptography and Data Security, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

POSTER: TouchTrack: How Unique are your Touch Gestures?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
A differential privacy framework for matrix factorization recommender systems.
User Model. User Adapt. Interact., 2016

Privacy-Aware Multipath Video Caching for Content-Centric Networks.
IEEE J. Sel. Areas Commun., 2016

Session Throughput Prediction for Internet Videos.
IEEE Commun. Mag., 2016

SplitBox: Toward Efficient Private Network Function Virtualization.
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016

uDrop: Pushing drop-box to the edge of mobile network.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Characterization of early smartwatch apps.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Towards Policy Enforcement Point as a Service (PEPS).
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

An Empirical Analysis of a Large-scale Mobile Cloud Storage Service.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015

Small Wearable Internet.
IEEE Internet Comput., 2015

Private Processing of Outsourced Network Functions: Feasibility and Constructions.
IACR Cryptol. ePrint Arch., 2015

When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack.
IACR Cryptol. ePrint Arch., 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

Web for Wearables: Lessons learned from Google Glass.
CoRR, 2015

Early Detection of Spam Mobile Apps.
Proceedings of the 24th International Conference on World Wide Web, 2015

User Behavior Characterization of a Large-scale Mobile Live Streaming System.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Applying Differential Privacy to Matrix Factorization.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

A Spatio-Temporal Analysis of Mobile Internet Traffic in Public Transportation Systems: A View of Web Browsing from The Bus.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015

A proactive transport mechanism with Explicit Congestion Notification for NDN.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Characterizing and Predicting Viral-and-Popular Video Content.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Linking wireless devices using information contained in Wi-Fi probe requests.
Pervasive Mob. Comput., 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptol. ePrint Arch., 2014

Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets.
CoRR, 2014

Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case.
CoRR, 2014

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Stylometric Linkability of Tweets.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Information leakage through mobile analytics services.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Graph-Based Recommendations: Make the Most Out of Social Data.
Proceedings of the User Modeling, Adaptation, and Personalization, 2014

On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014

Demo: Crowd-cache - popular content for free.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Improving business rating predictions using graph based features.
Proceedings of the 19th International Conference on Intelligent User Interfaces, 2014

Characterising user targeting for in-App Mobile Ads.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

On the geographic patterns of a large-scale mobile video-on-demand system.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

Freeway: Adaptively Isolating the Elephant and Mice Flows on Different Transmission Paths.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

CRCache: Exploiting the correlation between content popularity and network topology information for ICN caching.
Proceedings of the IEEE International Conference on Communications, 2014

Asynchronous Covert Communication Using BitTorrent Trackers.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads.
Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014

On the Intrusiveness of JavaScript on the Web.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

Towards the Era of Wearable Computing?
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

2013
Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones.
ERCIM News, 2013

On the potential of recommendation technologies for efficient content delivery networks.
Comput. Commun. Rev., 2013

Privacy in content-oriented networking: threats and countermeasures.
Comput. Commun. Rev., 2013

On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
Proceedings of the SECRYPT 2013, 2013

Cross social networks interests predictions based ongraph features.
Proceedings of the Seventh ACM Conference on Recommender Systems, 2013

Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013

How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

LMD: A local minimum driven and self-organized method to obtain locators.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

A genealogy of information spreading on microblogs: A Galton-Watson-based explicative model.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

Evaluation of third party tracking on the web.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Reconciling bitter rivals: Towards privacy-aware and bandwidth efficient mobile Ads delivery networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
Path similarity evaluation using Bloom filters.
Comput. Networks, 2012

I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Is more always merrier?: a deep dive into online social footprints.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Big friend is watching you: analyzing online social networks tracking capabilities.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Betrayed by Your Ads! - Reconstructing User Profiles from Targeted Ads.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

You are what you like! Information leakage through users' Interests.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Inferring user relationship from hidden information in WLANs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

FPC: A self-organized greedy routing in scale-free networks.
Proceedings of the 2012 IEEE Symposium on Computers and Communications, 2012

Watching videos from everywhere: a study of the PPTV mobile VoD system.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

IBTrack: An ICMP black holes tracker.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
IP geolocation databases: unreliable?
Comput. Commun. Rev., 2011

How Unique and Traceable Are Usernames?
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

EphPub: Toward robust Ephemeral Publishing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

A Survey on Network Coordinates Systems, Design, and Security.
IEEE Commun. Surv. Tutorials, 2010

Why spammers should thank Google?
Proceedings of the 3rd Workshop on Social Network Systems, Paris, France, April 13, 2010, 2010

How Secure are Secure Localization Protocols in WSNs?
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Owner-Centric Networking: A New Architecture for a Pollution-Free Internet.
ERCIM News, 2009

Owner-Centric Networking (OCN): Toward a Data Pollution-Free Internet.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning.
Proceedings of the NETWORKING 2009, 2009

Geolocalization of proxied services and its application to fast-flux hidden servers.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Certified Internet Coordinates.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

A Self-Organized Clustering Scheme for Overlay Networks.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

Overlay routing using coordinate systems.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Securiting Internet coordinates systems. (La sécurité des systèmes de coordonnées Internet).
PhD thesis, 2007

Securing internet coordinate embedding systems.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Securing Internet Coordinate Systems.
Proceedings of the Sustainable Internet, Third Asian Internet Engineering Conference, 2007

2006
Real attacks on virtual networks: Vivaldi out of tune.
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense, 2006

A Locating-First Approach for Scalable Overlay Multicast.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Wireless alternative best effort service: a case study of ALM.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

Virtual networks under attack: disrupting internet coordinate systems.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006

A Topology-Aware Overlay Multicast Approach for Mobile Ad-Hoc Networks.
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006

2004
A Kerberos-Based Authentication Architecture for Wireless LANs.
Proceedings of the NETWORKING 2004, 2004

A Kerberos-Based Authentication Architecture for WLANS - Test beds and experiments.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004


  Loading...