Walid Dabbous
Walid Dabbous
Verified email at - Homepage
Cited by
Cited by
Survey and taxonomy of IP address lookup algorithms
MA Ruiz-Sanchez, EW Biersack, W Dabbous
IEEE Network 15 (2), 8-23, 2001
Multipoint communication: a survey of protocols, functions, and mechanisms
C Diot, W Dabbous, J Crowcroft
IEEE Journal on Selected Areas in Communications 15 (3), 277-290, 1997
Network characteristics of video streaming traffic
A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous
Proceedings of the 2011 ACM CoNEXT conference, 2011
On TCP performance in a heterogeneous network: a survey
C Barakat, E Altman, W Dabbous
IEEE Communications Magazine 38 (1), 40-46, 2000
IP routing issues in satellite constellation networks
L Wood, A Clerget, I Andrikopoulos, G Pavlou, W Dabbous
International Journal of Satellite Communications 19 (1), 69-92, 2001
A link-layer tunneling mechanism for unidirectional links
E Duros, W Dabbous, H Izumiyama, N Fujii, Y Zhang
RFC3077, 2001
Direct code execution: Revisiting library os architecture for reproducible network experiments
H Tazaki, F Uarbani, E Mancini, M Lacage, D Camara, T Turletti, ...
Proceedings of the 2013 ACM CoNEXT conference, 2013
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'11), 2011
Generating efficient protocol code from an abstract specification
C Castelluccia, W Dabbous, S O'Malley
IEEE/ACM transactions on networking 5 (4), 514-524, 1997
Securing Internet Coordinate System: Embedding Phase
MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous
Inria Research Report, 2007
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar
Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), 2010
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference, 2011
Virtual networks under attack: disrupting internet coordinate systems
MA Kaafar, L Mathy, T Turletti, W Dabbous
Proceedings of the 2006 ACM CoNEXT conference, 2006
NEPI: An integration framework for network experimentation
A Quereilhac, M Lacage, C Freire, T Turletti, W Dabbous
Proceedings of SoftCOM 2011, 2011
Real attacks on virtual networks: Vivaldi out of tune
MA Kaafar, L Mathy, T Turletti, W Dabbous
Proceedings of the 2006 SIGCOMM workshop on Large-scale Attack Defense, 2006
Compromising Tor anonymity exploiting P2P information leakage
P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ...
Inria Research Report, 2010
TUF: tag-based unified fairness
A Clerget, W Dabbous
Proceedings of INFOCOM 2001, 2001
Meddle: middleboxes for increased transparency and control of mobile traffic
A Rao, J Sherry, A Legout, A Krishnamurthy, W Dabbous, D Choffnes
Proceedings of ACM CoNEXT 2012 student workshop, 65-66, 2012
NEPI: using independent simulators, emulators, and testbeds for easy experimentation
M Lacage, M Ferrari, M Hansen, T Turletti, W Dabbous
ACM SIGOPS Operating Systems Review 43 (4), 60-65, 2010
The system can't perform the operation now. Try again later.
Articles 1–20