Dali Kaafar
Dali Kaafar
Other namesMohamed Ali Kaafar
Professor, Executive Director, Research Group Director Faculty of Science and Engineering Macquarie
Verified email at - Homepage
Cited by
Cited by
IP geolocation databases: Unreliable?
I Poese, S Uhlig, MA Kaafar, B Donnet, B Gueye
ACM SIGCOMM Computer Communication Review 41 (2), 53-56, 2011
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
The impact of adverse weather conditions on autonomous vehicles: How rain, snow, fog, and hail affect the performance of a self-driving car
S Zang, M Ding, D Smith, P Tyler, T Rakotoarivelo, MA Kaafar
IEEE vehicular technology magazine 14 (2), 103-111, 2019
Ephpub: Toward robust ephemeral publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
2011 19th IEEE International Conference on Network Protocols, 165-175, 2011
You Are What You Like! Information leakage through users’ Interests
AB Chaabane, G Acs, MA Kaafar
Information leakage through users’ Interests, in" proceedings of the The …, 2012
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
An analysis of the privacy and security risks of android vpn permission-enabled apps
M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson
Proceedings of the 2016 internet measurement conference, 349-364, 2016
Paying for likes? understanding facebook like fraud using honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
Software-defined network (SDN) data plane security: issues, solutions, and future directions
A Shaghaghi, MA Kaafar, R Buyya, S Jha
Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
The Network and Distributed System Security Symposium 2016, 2015
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
Watching videos from everywhere: a study of the pptv mobile vod system
Z Li, J Lin, MI Akodjenou, G Xie, MA Kaafar, Y Jin, G Peng
Proceedings of the 2012 internet measurement conference, 185-198, 2012
A survey on network coordinates systems, design, and security
B Donnet, B Gueye, MA Kaafar
IEEE Communications Surveys & Tutorials 12 (4), 488-503, 2010
Towards seamless tracking-free web: Improved detection of trackers via one-class learning
M Ikram, HJ Asghar, MA Kaafar, B Krishnamurthy, A Mahanti
arXiv preprint arXiv:1603.06289, 2016
Betrayed by your ads! Reconstructing user profiles from targeted ads
C Castelluccia, MA Kaafar, MD Tran
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20