Mohamed Ali (Dali) Kaafar
Mohamed Ali (Dali) Kaafar
Professor, Executive Director, Research Group Director Faculty of Science and Engineering Macquarie
Verified email at - Homepage
Cited by
Cited by
IP geolocation databases: Unreliable?
I Poese, S Uhlig, MA Kaafar, B Donnet, B Gueye
ACM SIGCOMM Computer Communication Review 41 (2), 53-56, 2011
How unique and traceable are usernames?
D Perito, C Castelluccia, MA Kaafar, P Manils
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2011
You Are What You Like! Information leakage through users’ Interests
AB Chaabane, G Acs, MA Kaafar
Information leakage through users’ Interests, in" proceedings of the The …, 2012
Ephpub: Toward robust ephemeral publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
2011 19th IEEE International Conference on Network Protocols, 165-175, 2011
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
A Chaabane, P Manils, MA Kaafar
2010 fourth international conference on network and system security, 167-174, 2010
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
Paying for likes? understanding facebook like fraud using honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
An analysis of the privacy and security risks of android vpn permission-enabled apps
M Ikram, N Vallina-Rodriguez, S Seneviratne, MA Kaafar, V Paxson
Proceedings of the 2016 internet measurement conference, 349-364, 2016
Watching videos from everywhere: a study of the pptv mobile vod system
Z Li, J Lin, MI Akodjenou, G Xie, MA Kaafar, Y Jin, G Peng
Proceedings of the 2012 internet measurement conference, 185-198, 2012
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
A survey on network coordinates systems, design, and security
B Donnet, B Gueye, MA Kaafar
IEEE Communications Surveys & Tutorials 12 (4), 488-503, 2010
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
Censorship in the wild: Analyzing Internet filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
TLS in the wild: an Internet-wide analysis of TLS-based protocols for electronic communication
R Holz, J Amann, O Mehani, M Wachs, MA Kaafar
The Network and Distributed System Security Symposium 2016, 2015
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
Securing internet coordinate embedding systems
MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous
Proceedings of the 2007 conference on Applications, technologies …, 2007
Betrayed by your ads!
C Castelluccia, MA Kaafar, MD Tran
International Symposium on Privacy Enhancing Technologies Symposium, 1-17, 2012
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1103.1518, 2011
Trace-driven analysis of ICN caching algorithms on video-on-demand workloads
Y Sun, SK Fayaz, Y Guo, V Sekar, Y Jin, MA Kaafar, S Uhlig
Proceedings of the 10th ACM International on Conference on emerging …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20