Gabi Nakibly
Gabi Nakibly
Rafael
Verified email at cs.technion.ac.il - Homepage
Title
Cited by
Cited by
Year
Gyrophone: Recognizing speech from gyroscope signals
Y Michalevsky, D Boneh, G Nakibly
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1053-1067, 2014
2432014
Mobile device identification via sensor fingerprinting
H Bojinov, Y Michalevsky, G Nakibly, D Boneh
arXiv preprint arXiv:1408.1416, 2014
1982014
Powerspy: Location tracking using mobile device power analysis
Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly
24th {USENIX} Security Symposium ({USENIX} Security 15), 785-800, 2015
1672015
Routing loop attack using IPv6 automatic tunnels: Problem statement and proposed mitigations
G Nakibly, F Templin
RFC 6324, August, 2011
602011
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 17 (2), 487-500, 2009
372009
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
INFOCOM 2007. 26th Annual Joint Conference of the IEEE Computer and …, 2007
372007
Hardware fingerprinting using HTML5
G Nakibly, G Shelef, S Yudilevich
arXiv preprint arXiv:1503.01408, 2015
282015
Persistent OSPF Attacks
G Nakibly, A Kirshon, D Gonikman, D Boneh
NDSS, 2012
272012
Website-targeted false content injection by network operators
G Nakibly, J Schcolnik, Y Rubin
25th {USENIX} Security Symposium ({USENIX} Security 16), 227-244, 2016
262016
Maximizing restorable throughput in MPLS networks
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 18 (2), 568-581, 2009
252009
Maximizing Restorable Throughput in MPLS Networks
R Cohen, G Nakibly
INFOCOM 2008. 27th Annual Joint Conference of the IEEE Computer and …, 2008
252008
Method and system of restoring flow of traffic through networks
R Cohen, G Nakibly
US Patent 8,634,301, 2014
242014
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and …, 2004
202004
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 16 (3), 691-704, 2008
162008
OSPF vulnerability to persistent poisoning attacks: a systematic analysis
G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
152014
Finding security vulnerabilities in a network protocol using parameterized systems
A Sosnovich, O Grumberg, G Nakibly
International Conference on Computer Aided Verification, 724-739, 2013
142013
Oss: Using online scanning services for censorship circumvention
D Fifield, G Nakibly, D Boneh
International Symposium on Privacy Enhancing Technologies Symposium, 185-204, 2013
142013
Optimizing data plane resources for multipath flows
G Nakibly, R Cohen, L Katzir
IEEE/ACM Transactions on Networking 23 (1), 138-147, 2013
102013
Traffic Engineering Algorithms for IP and MPLS Networks: Novel and practical algorithms for routing optimization of large operational networks
G Nakibly
Scholars' Press, 2014
72014
Owning the Routing Table Part II
G Nakibly, E Menahem, A Waizel, Y Elovici
Black Hat USA, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20