Roksana Boreli
Roksana Boreli
Principal Consultant at TMPP Pty. Ltd.
Adresse e-mail validée de tmppbiz.com
Titre
Citée par
Citée par
Année
Network-level security and privacy control for smart-home IoT devices
V Sivaraman, HH Gharakheili, A Vishwanath, R Boreli, O Mehani
2015 IEEE 11th International conference on wireless and mobile computing …, 2015
2482015
An experimental study of security and privacy risks with emerging household appliances
S Notra, M Siddiqi, HH Gharakheili, V Sivaraman, R Boreli
2014 IEEE conference on communications and network security, 79-84, 2014
1472014
A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow
M Nobakht, V Sivaraman, R Boreli
2016 11th International conference on availability, reliability and security …, 2016
1102016
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
1002013
Smart-phones attacking smart-homes
V Sivaraman, D Chan, D Earl, R Boreli
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
952016
DAPS: Intelligent delay-aware packet scheduling for multipath transport
N Kuhn, E Lochin, A Mifdaoui, G Sarwar, O Mehani, R Boreli
2014 IEEE International Conference on Communications (ICC), 1222-1227, 2014
942014
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
922012
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks
S Ferlin, Ö Alay, O Mehani, R Boreli
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 431-439, 2016
892016
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
812014
Packet based communications
R Boreli, TMP Percival
US Patent App. 12/298,123, 2010
702010
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
642015
Is more always merrier? A deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
632012
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
512012
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
GS Babil, O Mehani, R Boreli, MA Kaafar
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
502013
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, M Kaafar, R Boreli
Proceedings of the International AAAI Conference on Web and Social Media 7 (1), 2013
502013
Trusted routing for VANET
T Chen, O Mehani, R Boreli
2009 9th International Conference on Intelligent Transport Systems …, 2009
462009
Information leakage through mobile analytics services
T Chen, I Ullah, MA Kaafar, R Boreli
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
452014
Inferring user relationship from hidden information in wlans
N Cheng, P Mohapatra, M Cunche, MA Kaafar, R Boreli, S Krishnamurthy
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
442012
Mitigating receiver's buffer blocking by delay aware packet scheduling in multipath data transfer
G Sarwar, R Boreli, E Lochin, A Mifdaoui, G Smith
2013 27th international conference on advanced information networking and …, 2013
402013
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
302013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20