Follow
Mashael AlSabah
Mashael AlSabah
Qatar Computing Research Institute
Verified email at hbku.edu.qa
Title
Cited by
Cited by
Year
Circuit fingerprinting attacks: Passive deanonymization of tor hidden services
A Kwon, M AlSabah, D Lazar, M Dacier, S Devadas
24th {USENIX} Security Symposium ({USENIX} Security 15), 287-302, 2015
1672015
Changing of the guards: A framework for understanding and improving entry guard selection in Tor
T Elahi, K Bauer, M AlSabah, R Dingledine, I Goldberg
Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 43-54, 2012
1092012
Enhancing Tor's performance using real-time traffic classification
M AlSabah, K Bauer, I Goldberg
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1022012
DefenestraTor: Throwing out windows in Tor
M AlSabah, K Bauer, I Goldberg, D Grunwald, D McCoy, S Savage, ...
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
952011
Performance and security improvements for tor: A survey
M AlSabah, I Goldberg
ACM Computing Surveys (CSUR) 49 (2), 1-36, 2016
942016
The path less travelled: Overcoming Tor’s bottlenecks with traffic splitting
M AlSabah, K Bauer, T Elahi, I Goldberg
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013
84*2013
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
H Al Jawaheri, M Al Sabah, Y Boshmaf, A Erbad
Computers & Security 89, 101684, 2020
462020
PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networks
M AlSabah, I Goldberg
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
462013
Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset
M Alsabah, G Oligeri, R Riley
Computers and Security (COSE1320), 2018
392018
BlockTag: Design and applications of a tagging system for blockchain analysis
Y Boshmaf, H Al Jawaheri, M Al Sabah
ICT Systems Security and Privacy Protection: 34th IFIP TC 11 International …, 2019
172019
Investigating MMM Ponzi scheme on bitcoin
Y Boshmaf, C Elvitigala, H Al Jawaheri, P Wijesekera, M Al Sabah
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
132020
Empirical performance evaluation of QUIC protocol for Tor anonymity network
L Basyoni, A Erbad, M Alsabah, N Fetais, M Guizani
2019 15th International Wireless Communications & Mobile Computing …, 2019
102019
When a small leak sinks a great ship: Deanonymizing tor hidden service users through bitcoin transactions analysis
HA Jawaheri, MA Sabah, Y Boshmaf, A Erbad
arXiv preprint arXiv:1801.07501, 2018
102018
QuicTor: Enhancing tor for real-time communication using QUIC transport protocol
L Basyoni, A Erbad, M Alsabah, N Fetais, A Mohamed, M Guizani
IEEE Access 9, 28769-28784, 2021
52021
Context-aware RAON middleware for opportunistic network
G Lau, M Al-Sabah, M Jaseemuddin, H Razavi, M Bhuiyan
Pervasive and Mobile Computing 41, 28-45, 2017
52017
PriviPK: Certificate-less and secure email communication
M AlSabah, A Tomescu, I Lebedev, D Serpanos, S Devadas
Computers & Security 70, 1-15, 2017
42017
Characterizing Bitcoin donations to open source software on GitHub
Y Zhauniarovich, Y Boshmaf, HA Jawaheri, MA Sabah
arXiv preprint arXiv:1907.04002, 2019
32019
Measurement and analysis of bitcoin transactions of ransomware
H Basil Al Jawaheri, M Al Sabah, Y Boshmaf
Qatar Foundation Annual Research Conference Proceedings 2018 (3), ICTPD1026, 2018
22018
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
ACM Transactions on Privacy and Security 26 (1), 1-32, 2022
12022
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference
E Choo, M Nabeel, M Alsabah, I Khalil, T Yu, W Wang
arXiv preprint arXiv:1911.12080, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20