Mohamed Ali Kaafar mainly focuses on World Wide Web, Computer security, The Internet, Computer network and Internet privacy. His studies in World Wide Web integrate themes in fields like Multimedia, Popularity distribution and Focus. His work on Malware, Encryption and Anonymity as part of general Computer security research is frequently linked to Permission, thereby connecting diverse disciplines of science.
He has included themes like Identifier, Entropy, Levenshtein distance and Web service in his The Internet study. His Computer network research is multidisciplinary, incorporating perspectives in Wireless, Wireless network, IEEE 802.11, Distributed computing and Classifier. His work deals with themes such as Adversary, Tunneling protocol and Profiling, which intersect with Internet privacy.
Mohamed Ali Kaafar mainly investigates Computer network, Computer security, World Wide Web, The Internet and Internet privacy. His study looks at the relationship between Computer network and fields such as Distributed computing, as well as how they intersect with chemical problems. Mohamed Ali Kaafar works mostly in the field of Computer security, limiting it down to concerns involving BitTorrent and, occasionally, BitTorrent tracker and Adversary.
His study in the field of Mobile device, JavaScript and Ad blocking also crosses realms of Set. His Mobile device research is multidisciplinary, relying on both Multimedia, Mobile computing and Mobile search. His The Internet research also works with subjects such as
The scientist’s investigation covers issues in Artificial intelligence, Machine learning, Computer security, World Wide Web and Computer network. His Artificial intelligence study integrates concerns from other disciplines, such as Data modeling and Server. His Computer security study frequently intersects with other fields, such as Software-defined networking.
His work on JavaScript and The Internet as part of general World Wide Web study is frequently linked to Set and Block, therefore connecting diverse disciplines of science. His biological study spans a wide range of topics, including Blacklist, Mobile computing and Route Views. Mohamed Ali Kaafar regularly links together related areas like Mobile device in his Computer network studies.
His primary scientific interests are in Computer security, Software-defined networking, Forwarding plane, Network architecture and Vulnerability. His Computer security study incorporates themes from Directed graph, Call graph and Mobile apps. His Software-defined networking research is multidisciplinary, relying on both Centralized management, Architectural change, Routing control plane and Security domain.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
IP geolocation databases: unreliable?
Ingmar Poese;Steve Uhlig;Mohamed Ali Kaafar;Benoit Donnet.
acm special interest group on data communication (2011)
How unique and traceable are usernames
Daniele Perito;Claude Castelluccia;Mohamed Ali Kaafar;Pere Manils.
privacy enhancing technologies (2011)
You Are What You Like! Information Leakage Through Users' Interests
Abdelberi Chaabane;Gergely Acs;Mohamed Ali Kaafar.
network and distributed system security symposium (2012)
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
Abdelberi Chaabane;Pere Manils;Mohamed Ali Kaafar.
network and system security (2010)
Privacy in content-oriented networking: threats and countermeasures
Abdelberi Chaabane;Emiliano De Cristofaro;Mohamed Ali Kaafar;Ersin Uzun.
acm special interest group on data communication (2013)
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots
Emiliano De Cristofaro;Arik Friedman;Guillaume Jourjon;Mohamed Ali Kaafar.
internet measurement conference (2014)
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps
Muhammad Ikram;Narseo Vallina-Rodriguez;Suranga Seneviratne;Mohamed Ali Kaafar.
internet measurement conference (2016)
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
Golam Sarwar Babil;Olivier Mehani;Roksana Boreli;Mohamed-Ali Kaafar.
international conference on security and cryptography (2013)
The Impact of Adverse Weather Conditions on Autonomous Vehicles: How Rain, Snow, Fog, and Hail Affect the Performance of a Self-Driving Car
Shizhe Zang;Ming Ding;David Smith;Paul Tyler.
IEEE Vehicular Technology Magazine (2019)
Watching videos from everywhere: a study of the PPTV mobile VoD system
Zhenyu Li;Jiali Lin;Marc-Ismael Akodjenou;Gaogang Xie.
internet measurement conference (2012)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University College London
University of New South Wales
French Institute for Research in Computer Science and Automation - INRIA
French Institute for Research in Computer Science and Automation - INRIA
7investing
Macquarie University
University of New South Wales
University of Science and Technology of China
Commonwealth Scientific and Industrial Research Organisation
University of New South Wales
Newcastle University
SRI International
University of Michigan–Ann Arbor
University of Wisconsin–Milwaukee
MIT
Los Alamos National Laboratory
Howard Hughes Medical Institute
National Institutes of Health
Swedish University of Agricultural Sciences
Colorado State University
Spanish National Research Council
University of Alberta
Goethe University Frankfurt
Université Laval
University of Washington
University of Winchester