Roksana Boreli
Roksana Boreli
Principal Consultant at TMPP Pty. Ltd.
Verified email at
Cited by
Cited by
Network-level security and privacy control for smart-home IoT devices
V Sivaraman, HH Gharakheili, A Vishwanath, R Boreli, O Mehani
2015 IEEE 11th International conference on wireless and mobile computing†…, 2015
An experimental study of security and privacy risks with emerging household appliances
S Notra, M Siddiqi, HH Gharakheili, V Sivaraman, R Boreli
2014 IEEE conference on communications and network security, 79-84, 2014
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
G Sarwar, O Mehani, R Boreli, MA Kaafar
SECRYPT 96435, 2013
A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow
M Nobakht, V Sivaraman, R Boreli
2016 11th International conference on availability, reliability and security†…, 2016
DAPS: Intelligent delay-aware packet scheduling for multipath transport
N Kuhn, E Lochin, A Mifdaoui, G Sarwar, O Mehani, R Boreli
2014 IEEE International Conference on Communications (ICC), 1222-1227, 2014
I know who you will meet this evening! linking wireless devices using wi-fi probe requests
M Cunche, MA Kaafar, R Boreli
2012 IEEE International Symposium on a World of Wireless, Mobile and†…, 2012
Smart-phones attacking smart-homes
V Sivaraman, D Chan, D Earl, R Boreli
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and†…, 2016
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks
S Ferlin, ÷ Alay, O Mehani, R Boreli
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 431-439, 2016
Linking wireless devices using information contained in Wi-Fi probe requests
M Cunche, MA Kaafar, R Boreli
Pervasive and Mobile Computing 11, 56-69, 2014
Packet based communications
R Boreli, TMP Percival
US Patent App. 12/298,123, 2010
Is more always merrier? A deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks†…, 2012
Applying differential privacy to matrix factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
The where and when of finding new friends: Analysis of a location-based social discovery network
T Chen, MA Kaafar, R Boreli
Seventh International AAAI Conference on Weblogs and Social Media, 2013
Big friend is watching you: Analyzing online social networks tracking capabilities
A Chaabane, MA Kaafar, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks, 7-12, 2012
On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices
GS Babil, O Mehani, R Boreli, MA Kaafar
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
Inferring user relationship from hidden information in wlans
N Cheng, P Mohapatra, M Cunche, MA Kaafar, R Boreli, S Krishnamurthy
MILCOM 2012-2012 IEEE Military Communications Conference, 1-6, 2012
Trusted routing for VANET
T Chen, O Mehani, R Boreli
2009 9th International Conference on Intelligent Transport Systems†…, 2009
Information leakage through mobile analytics services
T Chen, I Ullah, MA Kaafar, R Boreli
Proceedings of the 15th Workshop on Mobile Computing Systems and†…, 2014
Mitigating receiver's buffer blocking by delay aware packet scheduling in multipath data transfer
G Sarwar, R Boreli, E Lochin, A Mifdaoui, G Smith
2013 27th International Conference on Advanced Information Networking and†…, 2013
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless†…, 2013
The system can't perform the operation now. Try again later.
Articles 1–20