Abdelberi Chaabane
According to our database1,
Abdelberi Chaabane
authored at least 22 papers
between 2010 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2019
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop.
Proceedings of the Internet Measurement Conference 2018, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Semi-automated discovery of server-based information oversharing vulnerabilities in Android applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017
2016
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
2014
Online Social Networks : Is it the end of Privacy ? (Etude des menaces contre la vie privée sur les réseaux sociaux : quantification et possibles solutions).
PhD thesis, 2014
A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?
Proceedings of the Passive and Active Measurement - 15th International Conference, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
2013
CoRR, 2013
Comput. Commun. Rev., 2013
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2013
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
2012
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010