default search action
Gabi Nakibly
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c19]Nurit Devir, Orna Grumberg, Shaul Markovitch, Gabi Nakibly:
Topology-Agnostic Runtime Detection of OSPF Routing Attacks. CNS 2019: 277-285 - 2018
- [c18]Reuven Cohen, Yuval Dagan, Gabi Nakibly:
Proactive Rerouting in Network Overlays. Networking 2018: 163-171 - 2017
- [i7]Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Formal Black-Box Analysis of Routing Protocol Implementations. CoRR abs/1709.08096 (2017) - 2016
- [j5]Reuven Cohen, Gabi Nakibly:
Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge. IEEE/ACM Trans. Netw. 24(4): 2074-2085 (2016) - [c17]Gabi Nakibly, Jaime Schcolnik, Yossi Rubin:
Website-Targeted False Content Injection by Network Operators. USENIX Security Symposium 2016: 227-244 - [i6]Gabi Nakibly, Jaime Schcolnik, Yossi Rubin:
Website-Targeted False Content Injection by Network Operators. CoRR abs/1602.07128 (2016) - 2015
- [j4]Gabi Nakibly, Reuven Cohen, Liran Katzir:
Optimizing Data Plane Resources for Multipath Flows. IEEE/ACM Trans. Netw. 23(1): 138-147 (2015) - [c16]Reuven Cohen, Raziel Hess-Green, Gabi Nakibly:
Small lies, lots of damage: a partition attack on link-state routing protocols. CNS 2015: 397-405 - [c15]Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Analyzing Internet Routing Security Using Model Checking. LPAR 2015: 112-129 - [c14]Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:
PowerSpy: Location Tracking Using Mobile Device Power Analysis. USENIX Security Symposium 2015: 785-800 - [i5]Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Dan Boneh:
PowerSpy: Location Tracking using Mobile Device Power Analysis. CoRR abs/1502.03182 (2015) - [i4]Gabi Nakibly, Gilad Shelef, Shiran Yudilevich:
Hardware Fingerprinting Using HTML5. CoRR abs/1503.01408 (2015) - 2014
- [c13]Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici:
OSPF vulnerability to persistent poisoning attacks: a systematic analysis. ACSAC 2014: 336-345 - [c12]Reuven Cohen, Gabi Nakibly:
Restorable logical topology in the face of no or partial traffic demand knowledge. INFOCOM 2014: 1626-1634 - [c11]Yan Michalevsky, Dan Boneh, Gabi Nakibly:
Gyrophone: Recognizing Speech from Gyroscope Signals. USENIX Security Symposium 2014: 1053-1067 - [i3]Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh:
Mobile Device Identification via Sensor Fingerprinting. CoRR abs/1408.1416 (2014) - 2013
- [c10]Adi Sosnovich, Orna Grumberg, Gabi Nakibly:
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems. CAV 2013: 724-739 - [c9]Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly:
ACTIDS: an active strategy for detecting and localizing network attacks. AISec 2013: 55-66 - [c8]David Fifield, Gabi Nakibly, Dan Boneh:
OSS: Using Online Scanning Services for Censorship Circumvention. Privacy Enhancing Technologies 2013: 185-204 - [c7]Roee Hay, Jonathan Kalechstain, Gabi Nakibly:
Subverting BIND's SRTT Algorithm Derandomizing NS Selection. WOOT 2013 - [i2]Eitan Menahem, Gabi Nakibly, Yuval Elovici:
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks. CoRR abs/1306.4845 (2013) - 2012
- [c6]Eitan Menahem, Gabi Nakibly, Yuval Elovici:
Network-based intrusion detection systems go active! CCS 2012: 1004-1006 - [c5]Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh:
Persistent OSPF Attacks. NDSS 2012 - 2011
- [i1]Gabi Nakibly, Fred L. Templin:
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations. RFC 6324: 1-19 (2011) - 2010
- [j3]Reuven Cohen, Gabi Nakibly:
Maximizing restorable throughput in MPLS networks. IEEE/ACM Trans. Netw. 18(2): 568-581 (2010)
2000 – 2009
- 2009
- [j2]Reuven Cohen, Gabi Nakibly:
A traffic engineering approach for placement and selection of network services. IEEE/ACM Trans. Netw. 17(2): 487-500 (2009) - [c4]Gabi Nakibly, Michael Arov:
Routing Loop Attacks using IPv6 Tunnels. WOOT 2009: 1-7 - 2008
- [j1]Reuven Cohen, Gabi Nakibly:
On the computational complexity and effectiveness of N-hub shortest-path routing. IEEE/ACM Trans. Netw. 16(3): 691-704 (2008) - [c3]Reuven Cohen, Gabi Nakibly:
Maximizing Restorable Throughput in MPLS Networks. INFOCOM 2008: 2324-2332 - 2007
- [b1]Gabi Nakibly:
Traffic engineering in IP and MPLS. Technion - Israel Institute of Technology, Israel, 2007 - [c2]Reuven Cohen, Gabi Nakibly:
A Traffic Engineering Approach for Placement and Selection of Network Services. INFOCOM 2007: 1793-1801 - 2004
- [c1]Reuven Cohen, Gabi Nakibly:
On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing. INFOCOM 2004
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint