Mohamed Ali (Dali) Kaafar
Mohamed Ali (Dali) Kaafar
Professor, Scientific Director, Group Leader Faculty of Science and Engineering Macquarie University
Verified email at mq.edu.au - Homepage
TitleCited byYear
IP geolocation databases: Unreliable?
I Poese, S Uhlig, MA Kaafar, B Donnet, B Gueye
ACM SIGCOMM Computer Communication Review 41 (2), 53-56, 2011
2922011
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
2002011
You Are What You Like! Information leakage through users’ Interests
AB Chaabane, G Acs, MA Kaafar
Information leakage through users’ Interests, in" proceedings of the The …, 2012
1162012
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 Fourth International Conference on Network and System Security, 167-174, 2010
1002010
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
982013
Paying for likes?: Understanding facebook like fraud using honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
912014
On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices
G Sarwar, O Mehani, R Boreli, MA Kaafar
10th International Conference on Security and Cryptography, SECRYPT 2013 …, 2013
892013
Watching videos from everywhere: a study of the pptv mobile vod system
Z Li, J Lin, MI Akodjenou, G Xie, MA Kaafar, Y Jin, G Peng
Proceedings of the 2012 Internet Measurement Conference, 185-198, 2012
882012
A survey on network coordinates systems, design, and security
B Donnet, B Gueye, MA Kaafar
IEEE Communications Surveys & Tutorials 12 (4), 488-503, 2010
852010
Ephpub: Toward robust ephemeral publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
2011 19th IEEE International Conference on Network Protocols, 165-175, 2011
822011
Securing internet coordinate embedding systems
MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous
ACM SIGCOMM Computer Communication Review 37 (4), 61-72, 2007
762007
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
742012
Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent
S Le Blond, A Legout, F Lefessant, W Dabbous, MA Kaafar
LEET’10, 2010
702010
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1103.1518, 2011
692011
Trace-driven analysis of ICN caching algorithms on video-on-demand workloads
Y Sun, SK Fayaz, Y Guo, V Sekar, Y Jin, MA Kaafar, S Uhlig
Proceedings of the 10th ACM International on Conference on emerging …, 2014
622014
Betrayed by your ads!
C Castelluccia, MA Kaafar, MD Tran
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2012
622012
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
592014
Is more always merrier?: a deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
562012
Virtual networks under attack: Disrupting internet coordinate systems
MA Kaafar, L Mathy, T Turletti, W Dabbous
Proceedings of the 2006 ACM CoNEXT conference, 12, 2006
542006
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
512014
The system can't perform the operation now. Try again later.
Articles 1–20