- 13
- 3
- 2
- 1
- 1
WD
Walid Dabbous
20
Documents
Présentation
Publications
- 4
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 20
- 7
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 12
- 8
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 2
- 2
- 4
- 3
- 7
- 1
|
Longitudinal study of exposure to radio frequencies at population scaleEnvironment International, 2022, 162, ⟨10.1016/j.envint.2022.107144⟩
Article dans une revue
hal-03618634v1
|
|
Evaluating Smartphone Accuracy for RSSI MeasurementsIEEE Transactions on Instrumentation and Measurement, 2021, 70, pp.1 - 12. ⟨10.1109/tim.2020.3048776⟩
Article dans une revue
hal-03063997v1
|
|
Linking a Social Identity to an IP AddressERCIM News, 2012, Special theme: Cybercrime and Privacy Issues, 90, pp.2
Article dans une revue
hal-01270464v1
|
|
Pushing BitTorrent Locality to the LimitComputer Networks, 2010, ⟨10.1016/j.comnet.2010.09.014⟩
Article dans une revue
inria-00534117v1
|
|
Hybrid Approach for Experimental Networking Research13th International conference on Distributed Computing and Networking, Jan 2012, Hong Kong, China. ⟨10.1007/978-3-642-25959-3_12⟩
Communication dans un congrès
hal-01281968v1
|
|
Meddle: middleboxes for increased transparency and control of mobile trafficCoNEXT Student Workshop, ACM, Dec 2012, Nice, France. ⟨10.1145/2413247.2413286⟩
Communication dans un congrès
hal-01281734v1
|
|
Network Characteristics of Video Streaming TrafficCONEXT 2011, Dec 2011, Tokyo, Japan
Communication dans un congrès
inria-00638063v1
|
|
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' PrivacyIMC’2011, Nov 2011, Berlin, Germany
Communication dans un congrès
inria-00632780v1
|
|
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor UsersLETT'11 - 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Mar 2011, Boston, United States
Communication dans un congrès
inria-00574178v1
|
|
BitTorrent Experiments on Testbeds: A Study of the Impact of Network LatenciesJDIR, 2010, Sophia Antipolis, France
Communication dans un congrès
inria-00467560v1
|
|
De-anonymizing BitTorrent Users on TorPoster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), Apr 2010, San Jose, CA, United States
Communication dans un congrès
inria-00471177v1
|
|
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), Usenix, Apr 2010, San Jose, CA, United States
Communication dans un congrès
inria-00470324v1
|
|
Can Realistic BitTorrent Experiments Be Performed on Clusters?10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10), Aug 2010, Delft, Netherlands
Communication dans un congrès
inria-00494410v1
|
|
Longitudinal Study of Exposure to Radio Frequencies at Population Scale2021
Pré-publication, Document de travail
hal-03361556v1
|
|
Evaluating Smartphone Accuracy for LTE Power Measurement2020
Pré-publication, Document de travail
hal-02320342v3
|
|
Pushing BitTorrent Locality to the Limit2009
Pré-publication, Document de travail
inria-00343822v2
|
|
Open-Source 4G Experimental Setup (Report)[Research Report] Inria & Université Cote d'Azur, CNRS, I3S, Sophia Antipolis, France. 2020
Rapport
hal-02445762v2
|
|
Floor the Ceil & Ceil the Floor: Revisiting AIMD Evaluation[Research Report] 2012
Rapport
hal-00733890v1
|
|
Angling for Big Fish in BitTorrent[Research Report] 2010
Rapport
inria-00451282v1
|
|
Compromising Tor Anonymity Exploiting P2P Information Leakage[Research Report] 2010
Rapport
inria-00471556v1
|