Author of the publication

A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated.

, , and . CoRR, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kaafar, Dali
add a person with the name Kaafar, Dali
 

Other publications of authors with the same name

AC-PROT: An Access Control Model to Improve Software-Defined Networking Security., , , , and . VTC Spring, page 1-5. IEEE, (2017)Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets., , , and . CoRR, (2014)Algebraic Attacks on Human Identification Protocols., , , , and . IACR Cryptology ePrint Archive, (2014)A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated., , and . CoRR, (2018)Who Let theDOGSOut: Anonymous but Auditable Communications Using Group Signature Schemes with Distributed Opening., , , , and . DPM/CBT@ESORICS, volume 12484 of Lecture Notes in Computer Science, page 437-446. Springer, (2020)CRCache: Exploiting the correlation between content popularity and network topology information for ICN caching., , , , , , and . ICC, page 3191-3196. IEEE, (2014)Averaging Attacks on Bounded Perturbation Algorithms., and . CoRR, (2019)Private Continual Release of Real-Valued Data Streams., , and . CoRR, (2018)Differentially Private Data Generative Models., , , , , , and . CoRR, (2018)Private Continual Release of Real-Valued Data Streams., , and . NDSS, The Internet Society, (2019)