Ali Mohamed

Results: 118



#Item
41Microsoft Word - T20121208.doc

Microsoft Word - T20121208.doc

Add to Reading List

Source URL: www.mbras.org.my

Language: English - Date: 2013-01-20 23:32:46
42Microsoft Word - PL30032013.doc

Microsoft Word - PL30032013.doc

Add to Reading List

Source URL: www.mbras.org.my

Language: English - Date: 2013-07-01 01:12:12
4313 Multiscale Analysis of Geophysical Signals Using the 2D Continuous Wavelet Transform Sid-Ali Ouadfeul1,2, Leila Aliouane2,3, Mohamed Hamoudi2, Amar Boudella2 and Said Eladj3 1Geosciences

13 Multiscale Analysis of Geophysical Signals Using the 2D Continuous Wavelet Transform Sid-Ali Ouadfeul1,2, Leila Aliouane2,3, Mohamed Hamoudi2, Amar Boudella2 and Said Eladj3 1Geosciences

Add to Reading List

Source URL: cdn.intechopen.com

Language: English - Date: 2012-07-03 10:12:27
44One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-03-08 10:07:59
45Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar INRIA Sophia Antipolis, FR  Kave Salamatian

Securing Internet Coordinate Embedding Systems Mohamed Ali Kaafar INRIA Sophia Antipolis, FR Kave Salamatian

Add to Reading List

Source URL: www.sigcomm.org

Language: English - Date: 2011-07-27 15:40:08
46Opta Preview Pack  Iraq - United Arab Emirates AFC Asian Cup AustraliaFriday, 30 January 2015

Opta Preview Pack Iraq - United Arab Emirates AFC Asian Cup AustraliaFriday, 30 January 2015

Add to Reading List

Source URL: mediachannel.the-afc.net

Language: English - Date: 2015-01-28 19:32:35
47On the Effectiveness of Obfuscation Techniques in Online Social Networks Terence Chen1,2 , Roksana Boreli1,2 , Mohamed-Ali Kaafar1,3 , and Arik Friedman1,2 1

On the Effectiveness of Obfuscation Techniques in Online Social Networks Terence Chen1,2 , Roksana Boreli1,2 , Mohamed-Ali Kaafar1,3 , and Arik Friedman1,2 1

Add to Reading List

Source URL: nrg.nicta.com.au

Language: English - Date: 2014-05-11 22:50:20
48You Are What You Like! Information Leakage Through Users’ Interests Abdelberi Chaabane, Gergely Acs, Mohamed Ali Kaafar INRIA France {chaabane, gergely.acs, kaafar}@inrialpes.fr  Abstract

You Are What You Like! Information Leakage Through Users’ Interests Abdelberi Chaabane, Gergely Acs, Mohamed Ali Kaafar INRIA France {chaabane, gergely.acs, kaafar}@inrialpes.fr Abstract

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2012-01-14 07:28:40
49Real attacks on virtual networks: Vivaldi out of tune Mohamed Ali Kaafar INRIA Sophia Antipolis   Laurent Mathy

Real attacks on virtual networks: Vivaldi out of tune Mohamed Ali Kaafar INRIA Sophia Antipolis Laurent Mathy

Add to Reading List

Source URL: orbi.ulg.ac.be

Language: English - Date: 2014-05-19 16:00:15
50Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito INRIA Rhone-Alpes Grenoble – France

Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils, Daniele Perito INRIA Rhone-Alpes Grenoble – France

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2010-04-16 08:57:42