Suivre
Roksana Boreli
Roksana Boreli
Principal Consultant at TMPP Pty. Ltd.
Adresse e-mail validée de tmppbiz.com
Titre
Citée par
Citée par
Année
Network-level security and privacy control for smart-home IoT devices
V Sivaraman, HH Gharakheili, A Vishwanath, R Boreli, O Mehani
2015 IEEE 11th International conference on wireless and mobile computing …, 2015
3722015
A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow
M Nobakht, V Sivaraman, R Boreli
2016 11th International conference on availability, reliability and security …, 2016
2622016
An experimental study of security and privacy risks with emerging household appliances
S Notra, M Siddiqi, HH Gharakheili, V Sivaraman, R Boreli
2014 IEEE conference on communications and network security, 79-84, 2014
2462014
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks
S Ferlin, Ö Alay, O Mehani, R Boreli
2016 IFIP networking conference (IFIP networking) and workshops, 431-439, 2016
2222016
Smart-phones attacking smart-homes
V Sivaraman, D Chan, D Earl, R Boreli
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
1632016
DAPS: Intelligent delay-aware packet scheduling for multipath transport
N Kuhn, E Lochin, A Mifdaoui, G Sarwar, O Mehani, R Boreli
2014 IEEE international conference on communications (ICC), 1222-1227, 2014
1582014
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
1492015
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
1352013
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
1202014
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
1132012
Is more always merrier? A deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
792012
Packet based communications
R Boreli, TMP Percival
US Patent App. 12/298,123, 2010
712010
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
652012
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
GS Babil, O Mehani, R Boreli, MA Kaafar
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
612013
Mitigating receiver's buffer blocking by delay aware packet scheduling in multipath data transfer
G Sarwar, R Boreli, E Lochin, A Mifdaoui, G Smith
2013 27th international conference on advanced information networking and …, 2013
612013
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, M Kaafar, R Boreli
Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013
592013
Information leakage through mobile analytics services
T Chen, I Ullah, MA Kaafar, R Boreli
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
572014
Trusted routing for VANET
T Chen, O Mehani, R Boreli
2009 9th International Conference on Intelligent Transport Systems …, 2009
522009
Inferring user relationship from hidden information in wlans
N Cheng, P Mohapatra, M Cunche, MA Kaafar, R Boreli, S Krishnamurthy
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
512012
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
502013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20