default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2019
- Nurit Devir, Orna Grumberg, Shaul Markovitch, Gabi Nakibly:
Topology-Agnostic Runtime Detection of OSPF Routing Attacks. CNS 2019: 277-285 - 2018
- Reuven Cohen, Yuval Dagan, Gabi Nakibly:
Proactive Rerouting in Network Overlays. Networking 2018: 163-171 - 2017
- Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Formal Black-Box Analysis of Routing Protocol Implementations. CoRR abs/1709.08096 (2017) - 2016
- Reuven Cohen, Gabi Nakibly:
Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge. IEEE/ACM Trans. Netw. 24(4): 2074-2085 (2016) - Gabi Nakibly, Jaime Schcolnik, Yossi Rubin:
Website-Targeted False Content Injection by Network Operators. USENIX Security Symposium 2016: 227-244 - Gabi Nakibly, Jaime Schcolnik, Yossi Rubin:
Website-Targeted False Content Injection by Network Operators. CoRR abs/1602.07128 (2016) - 2015
- Gabi Nakibly, Reuven Cohen, Liran Katzir:
Optimizing Data Plane Resources for Multipath Flows. IEEE/ACM Trans. Netw. 23(1): 138-147 (2015) - Reuven Cohen, Raziel Hess-Green, Gabi Nakibly:
Small lies, lots of damage: a partition attack on link-state routing protocols. CNS 2015: 397-405 - Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Analyzing Internet Routing Security Using Model Checking. LPAR 2015: 112-129 - Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:
PowerSpy: Location Tracking Using Mobile Device Power Analysis. USENIX Security Symposium 2015: 785-800 - Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Dan Boneh:
PowerSpy: Location Tracking using Mobile Device Power Analysis. CoRR abs/1502.03182 (2015) - Gabi Nakibly, Gilad Shelef, Shiran Yudilevich:
Hardware Fingerprinting Using HTML5. CoRR abs/1503.01408 (2015) - 2014
- Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici:
OSPF vulnerability to persistent poisoning attacks: a systematic analysis. ACSAC 2014: 336-345 - Reuven Cohen, Gabi Nakibly:
Restorable logical topology in the face of no or partial traffic demand knowledge. INFOCOM 2014: 1626-1634 - Yan Michalevsky, Dan Boneh, Gabi Nakibly:
Gyrophone: Recognizing Speech from Gyroscope Signals. USENIX Security Symposium 2014: 1053-1067 - Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh:
Mobile Device Identification via Sensor Fingerprinting. CoRR abs/1408.1416 (2014) - 2013
- Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems. CAV 2013: 724-739 - Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly:
ACTIDS: an active strategy for detecting and localizing network attacks. AISec 2013: 55-66 - David Fifield, Gabi Nakibly, Dan Boneh:
OSS: Using Online Scanning Services for Censorship Circumvention. Privacy Enhancing Technologies 2013: 185-204 - Roee Hay, Jonathan Kalechstain, Gabi Nakibly:
Subverting BIND's SRTT Algorithm Derandomizing NS Selection. WOOT 2013 - Eitan Menahem, Gabi Nakibly, Yuval Elovici:
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks. CoRR abs/1306.4845 (2013) - 2012
- Eitan Menahem, Gabi Nakibly, Yuval Elovici:
Network-based intrusion detection systems go active! CCS 2012: 1004-1006 - Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh:
Persistent OSPF Attacks. NDSS 2012 - 2011
- Gabi Nakibly, Fred L. Templin:
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations. RFC 6324: 1-19 (2011) - 2010
- Reuven Cohen, Gabi Nakibly:
Maximizing restorable throughput in MPLS networks. IEEE/ACM Trans. Netw. 18(2): 568-581 (2010) - 2009
- Reuven Cohen, Gabi Nakibly:
A traffic engineering approach for placement and selection of network services. IEEE/ACM Trans. Netw. 17(2): 487-500 (2009) - Gabi Nakibly, Michael Arov:
Routing Loop Attacks using IPv6 Tunnels. WOOT 2009: 1-7 - 2008
- Reuven Cohen, Gabi Nakibly:
On the computational complexity and effectiveness of N-hub shortest-path routing. IEEE/ACM Trans. Netw. 16(3): 691-704 (2008) - Reuven Cohen, Gabi Nakibly:
Maximizing Restorable Throughput in MPLS Networks. INFOCOM 2008: 2324-2332 - 2007
- Gabi Nakibly:
Traffic engineering in IP and MPLS. Technion - Israel Institute of Technology, Israel, 2007
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 20:40 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint