Survey and taxonomy of IP address lookup algorithms MA Ruiz-Sanchez, EW Biersack, W Dabbous IEEE Network 15 (2), 8-23, 2001 | 742 | 2001 |
Multipoint communication: a survey of protocols, functions, and mechanisms C Diot, W Dabbous, J Crowcroft IEEE Journal on Selected Areas in Communications 15 (3), 277-290, 1997 | 573 | 1997 |
Network characteristics of video streaming traffic A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous Proceedings of the 2011 ACM CoNEXT conference, 2011 | 445 | 2011 |
On TCP performance in a heterogeneous network: a survey C Barakat, E Altman, W Dabbous IEEE Communications Magazine 38 (1), 40-46, 2000 | 347 | 2000 |
IP routing issues in satellite constellation networks L Wood, A Clerget, I Andrikopoulos, G Pavlou, W Dabbous International Journal of Satellite Communications 19 (1), 69-92, 2001 | 240 | 2001 |
A link-layer tunneling mechanism for unidirectional links E Duros, W Dabbous, H Izumiyama, N Fujii, Y Zhang RFC3077, 2001 | 183 | 2001 |
Direct code execution: Revisiting library os architecture for reproducible network experiments H Tazaki, F Uarbani, E Mancini, M Lacage, D Camara, T Turletti, ... Proceedings of the 2013 ACM CoNEXT conference, 2013 | 173 | 2013 |
Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 137 | 2011 |
Generating efficient protocol code from an abstract specification C Castelluccia, W Dabbous, S O'Malley IEEE/ACM transactions on networking 5 (4), 514-524, 1997 | 96* | 1997 |
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ... Fourth USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'11), 2011 | 94 | 2011 |
Securing internet coordinate embedding systems MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous Proceedings of the 2007 conference on Applications, technologies …, 2007 | 84 | 2007 |
Securing Internet Coordinate System: Embedding Phase MA Kaafar, L Mathy, C Barakat, K Salamatian, T Turletti, W Dabbous Inria Research Report https://hal.inria.fr/inria-00151257, 2007 | 84* | 2007 |
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), 2010 | 73* | 2010 |
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM Internet Measurement Conference, 2011 | 63 | 2011 |
Virtual networks under attack: disrupting internet coordinate systems MA Kaafar, L Mathy, T Turletti, W Dabbous Proceedings of the 2006 ACM CoNEXT conference, 2006 | 60 | 2006 |
NEPI: An integration framework for network experimentation A Quereilhac, M Lacage, C Freire, T Turletti, W Dabbous Proceedings of SoftCOM 2011, 2011 | 57 | 2011 |
Real attacks on virtual networks: Vivaldi out of tune MA Kaafar, L Mathy, T Turletti, W Dabbous Proceedings of the 2006 SIGCOMM workshop on Large-scale Attack Defense, 2006 | 50 | 2006 |
TUF: tag-based unified fairness A Clerget, W Dabbous Proceedings of INFOCOM 2001, 2001 | 48 | 2001 |
Compromising Tor anonymity exploiting P2P information leakage P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ... Inria Research Report, 2010 | 46 | 2010 |
NEPI: using independent simulators, emulators, and testbeds for easy experimentation M Lacage, M Ferrari, M Hansen, T Turletti, W Dabbous ACM SIGOPS Operating Systems Review 43 (4), 60-65, 2010 | 45 | 2010 |