Follow
Roksana Boreli
Roksana Boreli
Principal Consultant at TMPP Pty. Ltd.
Verified email at tmppbiz.com
Title
Cited by
Cited by
Year
Network-level security and privacy control for smart-home IoT devices
V Sivaraman, HH Gharakheili, A Vishwanath, R Boreli, O Mehani
2015 IEEE 11th International conference on wireless and mobile computing …, 2015
3722015
A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow
M Nobakht, V Sivaraman, R Boreli
2016 11th International conference on availability, reliability and security …, 2016
2622016
An experimental study of security and privacy risks with emerging household appliances
S Notra, M Siddiqi, HH Gharakheili, V Sivaraman, R Boreli
2014 IEEE conference on communications and network security, 79-84, 2014
2462014
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks
S Ferlin, Ö Alay, O Mehani, R Boreli
2016 IFIP networking conference (IFIP networking) and workshops, 431-439, 2016
2222016
Smart-phones attacking smart-homes
V Sivaraman, D Chan, D Earl, R Boreli
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
1632016
DAPS: Intelligent delay-aware packet scheduling for multipath transport
N Kuhn, E Lochin, A Mifdaoui, G Sarwar, O Mehani, R Boreli
2014 IEEE international conference on communications (ICC), 1222-1227, 2014
1582014
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
1492015
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
1352013
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
1202014
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
1132012
Is more always merrier? A deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
792012
Packet based communications
R Boreli, TMP Percival
US Patent App. 12/298,123, 2010
712010
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
652012
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
GS Babil, O Mehani, R Boreli, MA Kaafar
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
612013
Mitigating receiver's buffer blocking by delay aware packet scheduling in multipath data transfer
G Sarwar, R Boreli, E Lochin, A Mifdaoui, G Smith
2013 27th international conference on advanced information networking and …, 2013
612013
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, M Kaafar, R Boreli
Proceedings of the International AAAI Conference on Web and Social Media 7 …, 2013
592013
Information leakage through mobile analytics services
T Chen, I Ullah, MA Kaafar, R Boreli
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
572014
Trusted routing for VANET
T Chen, O Mehani, R Boreli
2009 9th International Conference on Intelligent Transport Systems …, 2009
522009
Inferring user relationship from hidden information in wlans
N Cheng, P Mohapatra, M Cunche, MA Kaafar, R Boreli, S Krishnamurthy
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
512012
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
502013
The system can't perform the operation now. Try again later.
Articles 1–20