Network-level security and privacy control for smart-home IoT devices V Sivaraman, HH Gharakheili, A Vishwanath, R Boreli, O Mehani 2015 IEEE 11th International conference on wireless and mobile computing …, 2015 | 398 | 2015 |
A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow M Nobakht, V Sivaraman, R Boreli 2016 11th International conference on availability, reliability and security …, 2016 | 290 | 2016 |
An experimental study of security and privacy risks with emerging household appliances S Notra, M Siddiqi, HH Gharakheili, V Sivaraman, R Boreli 2014 IEEE conference on communications and network security, 79-84, 2014 | 263 | 2014 |
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks S Ferlin, Ö Alay, O Mehani, R Boreli 2016 IFIP networking conference (IFIP networking) and workshops, 431-439, 2016 | 261 | 2016 |
On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices GS Babil, O Mehani, R Boreli, MA Kaafar 2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013 | 191 | 2013 |
Smart-phones attacking smart-homes V Sivaraman, D Chan, D Earl, R Boreli Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 173 | 2016 |
DAPS: Intelligent delay-aware packet scheduling for multipath transport N Kuhn, E Lochin, A Mifdaoui, G Sarwar, O Mehani, R Boreli 2014 IEEE international conference on communications (ICC), 1222-1227, 2014 | 165 | 2014 |
Applying differential privacy to matrix factorization A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015 | 160 | 2015 |
Linking wireless devices using information contained in Wi-Fi probe requests M Cunche, MA Kaafar, R Boreli Pervasive and Mobile Computing 11, 56-69, 2014 | 129 | 2014 |
I know who you will meet this evening! linking wireless devices using wi-fi probe requests M Cunche, MA Kaafar, R Boreli 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 118 | 2012 |
Is more always merrier? A deep dive into online social footprints T Chen, MA Kaafar, A Friedman, R Boreli Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012 | 79 | 2012 |
Packet based communications R Boreli, TMP Percival US Patent App. 12/298,123, 2010 | 71 | 2010 |
Mitigating receiver's buffer blocking by delay aware packet scheduling in multipath data transfer G Sarwar, R Boreli, E Lochin, A Mifdaoui, G Smith 2013 27th international conference on advanced information networking and …, 2013 | 65 | 2013 |
Big friend is watching you: Analyzing online social networks tracking capabilities A Chaabane, MA Kaafar, R Boreli Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012 | 65 | 2012 |
The where and when of finding new friends: Analysis of a location-based social discovery network T Chen, M Kaafar, R Boreli Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013 | 60 | 2013 |
Information leakage through mobile analytics services T Chen, I Ullah, MA Kaafar, R Boreli Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014 | 59 | 2014 |
Trusted routing for VANET T Chen, O Mehani, R Boreli 2009 9th International Conference on Intelligent Transport Systems …, 2009 | 56 | 2009 |
Differential privacy in intelligent transportation systems F Kargl, A Friedman, R Boreli Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 53 | 2013 |
Inferring user relationship from hidden information in wlans N Cheng, P Mohapatra, M Cunche, MA Kaafar, R Boreli, S Krishnamurthy MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012 | 51 | 2012 |
Generating shares of secret data G Smith, R Boreli, A Friedman, M Djatmiko US Patent 10,360,392, 2019 | 44 | 2019 |