Author of the publication

WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.

, , , , and . Internet Measurement Conference, page 247-253. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chaabane, Abdelberi
add a person with the name Chaabane, Abdelberi
 

Other publications of authors with the same name

Compromising Tor Anonymity Exploiting P2P Information Leakage, , , , , , and . CoRR, (2010)Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network., , and . NSS, page 167-174. IEEE Computer Society, (2010)You are what you like! Information leakage through users' Interests., , and . NDSS, The Internet Society, (2012)Censorship in the Wild: Analyzing Web Filtering in Syria., , , , , and . CoRR, (2014)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 369-389. Springer, (2013)One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users, , , , , , and . CoRR, (2011)When Privacy meets Security: Leveraging personal information for password cracking, , , and . CoRR, (2013)Privacy in content-oriented networking: threats and countermeasures., , , and . Computer Communication Review, 43 (3): 25-33 (2013)Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web., , , , , and . CoRR, (2018)A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists., , , , , and . AsiaCCS, page 193-205. ACM, (2019)