Остановите войну!
for scientists:
default search action
Mohamed Ali Kâafar
- > Home > Persons > Mohamed Ali Kâafar
Publications
- 2019
- [j26]Hassan Jameel Asghar, Emiliano De Cristofaro, Guillaume Jourjon, Mohamed Ali Kâafar, Laurent Mathy, Luca Melis, Craig Russell, Mang Yu:
Fast privacy-preserving network function outsourcing. Comput. Networks 163 (2019) - 2017
- [j13]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur. 20(4): 13:1-13:28 (2017) - [c84]Shehroze Farooqi, Guillaume Jourjon, Muhammad Ikram, Mohamed Ali Kâafar, Emiliano De Cristofaro, Muhammad Zubair Shafiq, Arik Friedman, Fareed Zaffar:
Characterizing key stakeholders in an online black-hat marketplace. eCrime 2017: 17-27 - [i33]Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Measuring, Characterizing, and Detecting Facebook Like Farms. CoRR abs/1707.00190 (2017) - 2016
- [c77]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. SDN-NFV@CODASPY 2016: 39-44 - [c68]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. HotMiddlebox@SIGCOMM 2016: 7-13 - [i25]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. CoRR abs/1601.06454 (2016) - [i23]Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kâafar, Laurent Mathy:
SplitBox: Toward Efficient Private Network Function Virtualization. CoRR abs/1605.03772 (2016) - 2015
- [i20]Shehroze Farooqi, Muhammad Ikram, Gohar Irfan, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq, Fareed Zaffar:
Characterizing Seller-Driven Black-Hat Marketplaces. CoRR abs/1505.01637 (2015) - [i19]Muhammad Ikram, Lucky Onwuzurike, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Spying on Spammers: Tracking Like Farm Accounts on Facebook. CoRR abs/1506.00506 (2015) - [i16]Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Private Processing of Outsourced Network Functions: Feasibility and Constructions. IACR Cryptol. ePrint Arch. 2015: 949 (2015) - 2014
- [c54]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq:
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. Internet Measurement Conference 2014: 129-136 - [c53]Chaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Internet Filtering in Syria. Internet Measurement Conference 2014: 285-298 - [i14]Chaabane Abdelberi, Mathieu Cunche, Terence Chen, Arik Friedman, Emiliano De Cristofaro, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Web Filtering in Syria. CoRR abs/1402.3401 (2014) - [i12]Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, M. Zubair Shafiq:
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. CoRR abs/1409.2097 (2014) - 2013
- [j5]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in content-oriented networking: threats and countermeasures. Comput. Commun. Rev. 43(3): 25-33 (2013) - 2012
- [i8]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in Content-Oriented Networking: Threats and Countermeasures. CoRR abs/1211.5183 (2012) - 2011
- [c24]Claude Castelluccia, Emiliano De Cristofaro, Aurélien Francillon, Mohamed Ali Kâafar:
EphPub: Toward robust Ephemeral Publishing. ICNP 2011: 165-175
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint