BibTeX records: Gabi Nakibly

download as .bib file

@inproceedings{DBLP:conf/cns/DevirGMN19,
  author       = {Nurit Devir and
                  Orna Grumberg and
                  Shaul Markovitch and
                  Gabi Nakibly},
  title        = {Topology-Agnostic Runtime Detection of {OSPF} Routing Attacks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {277--285},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802826},
  doi          = {10.1109/CNS.2019.8802826},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DevirGMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/CohenDN18,
  author       = {Reuven Cohen and
                  Yuval Dagan and
                  Gabi Nakibly},
  editor       = {Claudio Casetti and
                  Fernando A. Kuipers and
                  James P. G. Sterbenz and
                  Burkhard Stiller},
  title        = {Proactive Rerouting in Network Overlays},
  booktitle    = {2018 {IFIP} Networking Conference and Workshops, Networking 2018,
                  Zurich, Switzerland, May 14-16, 2018},
  pages        = {163--171},
  publisher    = {{IFIP}},
  year         = {2018},
  url          = {http://dl.ifip.org/db/conf/networking/networking2018/3A3-1570416524.pdf},
  doi          = {10.23919/IFIPNETWORKING.2018.8696848},
  timestamp    = {Thu, 27 Jun 2024 12:35:50 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/CohenDN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-08096,
  author       = {Adi Sosnovich and
                  Orna Grumberg and
                  Gabi Nakibly},
  title        = {Formal Black-Box Analysis of Routing Protocol Implementations},
  journal      = {CoRR},
  volume       = {abs/1709.08096},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.08096},
  eprinttype    = {arXiv},
  eprint       = {1709.08096},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-08096.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/CohenN16,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {Restorable Logical Topology in the Face of No or Partial Traffic Demand
                  Knowledge},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {24},
  number       = {4},
  pages        = {2074--2085},
  year         = {2016},
  url          = {https://doi.org/10.1109/TNET.2015.2441108},
  doi          = {10.1109/TNET.2015.2441108},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/CohenN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NakiblySR16,
  author       = {Gabi Nakibly and
                  Jaime Schcolnik and
                  Yossi Rubin},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Website-Targeted False Content Injection by Network Operators},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {227--244},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nakibly},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NakiblySR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NakiblySR16,
  author       = {Gabi Nakibly and
                  Jaime Schcolnik and
                  Yossi Rubin},
  title        = {Website-Targeted False Content Injection by Network Operators},
  journal      = {CoRR},
  volume       = {abs/1602.07128},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.07128},
  eprinttype    = {arXiv},
  eprint       = {1602.07128},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NakiblySR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/NakiblyC015,
  author       = {Gabi Nakibly and
                  Reuven Cohen and
                  Liran Katzir},
  title        = {Optimizing Data Plane Resources for Multipath Flows},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {23},
  number       = {1},
  pages        = {138--147},
  year         = {2015},
  url          = {https://doi.org/10.1109/TNET.2013.2292895},
  doi          = {10.1109/TNET.2013.2292895},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/NakiblyC015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CohenHN15,
  author       = {Reuven Cohen and
                  Raziel Hess{-}Green and
                  Gabi Nakibly},
  title        = {Small lies, lots of damage: a partition attack on link-state routing
                  protocols},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {397--405},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346851},
  doi          = {10.1109/CNS.2015.7346851},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/CohenHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/SosnovichGN15,
  author       = {Adi Sosnovich and
                  Orna Grumberg and
                  Gabi Nakibly},
  editor       = {Martin Davis and
                  Ansgar Fehnker and
                  Annabelle McIver and
                  Andrei Voronkov},
  title        = {Analyzing Internet Routing Security Using Model Checking},
  booktitle    = {Logic for Programming, Artificial Intelligence, and Reasoning - 20th
                  International Conference, {LPAR-20} 2015, Suva, Fiji, November 24-28,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9450},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48899-7\_9},
  doi          = {10.1007/978-3-662-48899-7\_9},
  timestamp    = {Mon, 03 Jan 2022 22:31:30 +0100},
  biburl       = {https://dblp.org/rec/conf/lpar/SosnovichGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MichalevskySVBN15,
  author       = {Yan Michalevsky and
                  Aaron Schulman and
                  Gunaa Arumugam Veerapandian and
                  Dan Boneh and
                  Gabi Nakibly},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {PowerSpy: Location Tracking Using Mobile Device Power Analysis},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {785--800},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MichalevskySVBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MichalevskyNSB15,
  author       = {Yan Michalevsky and
                  Gabi Nakibly and
                  Aaron Schulman and
                  Dan Boneh},
  title        = {PowerSpy: Location Tracking using Mobile Device Power Analysis},
  journal      = {CoRR},
  volume       = {abs/1502.03182},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03182},
  eprinttype    = {arXiv},
  eprint       = {1502.03182},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MichalevskyNSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NakiblySY15,
  author       = {Gabi Nakibly and
                  Gilad Shelef and
                  Shiran Yudilevich},
  title        = {Hardware Fingerprinting Using {HTML5}},
  journal      = {CoRR},
  volume       = {abs/1503.01408},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.01408},
  eprinttype    = {arXiv},
  eprint       = {1503.01408},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NakiblySY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NakiblySMWE14,
  author       = {Gabi Nakibly and
                  Adi Sosnovich and
                  Eitan Menahem and
                  Ariel Waizel and
                  Yuval Elovici},
  editor       = {Charles N. Payne Jr. and
                  Adam Hahn and
                  Kevin R. B. Butler and
                  Micah Sherr},
  title        = {{OSPF} vulnerability to persistent poisoning attacks: a systematic
                  analysis},
  booktitle    = {Proceedings of the 30th Annual Computer Security Applications Conference,
                  {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
  pages        = {336--345},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2664243.2664278},
  doi          = {10.1145/2664243.2664278},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NakiblySMWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CohenN14,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {Restorable logical topology in the face of no or partial traffic demand
                  knowledge},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {1626--1634},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6848099},
  doi          = {10.1109/INFOCOM.2014.6848099},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CohenN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MichalevskyBN14,
  author       = {Yan Michalevsky and
                  Dan Boneh and
                  Gabi Nakibly},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Gyrophone: Recognizing Speech from Gyroscope Signals},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {1053--1067},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MichalevskyBN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BojinovMNB14,
  author       = {Hristo Bojinov and
                  Yan Michalevsky and
                  Gabi Nakibly and
                  Dan Boneh},
  title        = {Mobile Device Identification via Sensor Fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1408.1416},
  year         = {2014},
  url          = {http://arxiv.org/abs/1408.1416},
  eprinttype    = {arXiv},
  eprint       = {1408.1416},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BojinovMNB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/SosnovichGN13,
  author       = {Adi Sosnovich and
                  Orna Grumberg and
                  Gabi Nakibly},
  editor       = {Natasha Sharygina and
                  Helmut Veith},
  title        = {Finding Security Vulnerabilities in a Network Protocol Using Parameterized
                  Systems},
  booktitle    = {Computer Aided Verification - 25th International Conference, {CAV}
                  2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8044},
  pages        = {724--739},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39799-8\_51},
  doi          = {10.1007/978-3-642-39799-8\_51},
  timestamp    = {Wed, 07 Dec 2022 23:12:58 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/SosnovichGN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemEAN13,
  author       = {Eitan Menahem and
                  Yuval Elovici and
                  Nir Amar and
                  Gabi Nakibly},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Blaine Nelson and
                  Christos Dimitrakakis and
                  Elaine Shi},
  title        = {{ACTIDS:} an active strategy for detecting and localizing network
                  attacks},
  booktitle    = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
                  and Security, Co-located with {CCS} 2013, Berlin, Germany, November
                  4, 2013},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517312.2517323},
  doi          = {10.1145/2517312.2517323},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MenahemEAN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/FifieldNB13,
  author       = {David Fifield and
                  Gabi Nakibly and
                  Dan Boneh},
  editor       = {Emiliano De Cristofaro and
                  Matthew K. Wright},
  title        = {{OSS:} Using Online Scanning Services for Censorship Circumvention},
  booktitle    = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
                  2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39077-7\_10},
  doi          = {10.1007/978-3-642-39077-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/FifieldNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/HayKN13,
  author       = {Roee Hay and
                  Jonathan Kalechstain and
                  Gabi Nakibly},
  editor       = {Jon Oberheide and
                  William K. Robertson},
  title        = {Subverting BIND's {SRTT} Algorithm Derandomizing {NS} Selection},
  booktitle    = {7th {USENIX} Workshop on Offensive Technologies, {WOOT} '13, Washington,
                  D.C., USA, August 13, 2013},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/woot13/workshop-program/presentation/hay},
  timestamp    = {Mon, 01 Feb 2021 08:41:51 +0100},
  biburl       = {https://dblp.org/rec/conf/woot/HayKN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MenahemNE13,
  author       = {Eitan Menahem and
                  Gabi Nakibly and
                  Yuval Elovici},
  title        = {{ACTIDS:} An Active Strategy For Detecting And Localizing Network
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/1306.4845},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.4845},
  eprinttype    = {arXiv},
  eprint       = {1306.4845},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MenahemNE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemNE12,
  author       = {Eitan Menahem and
                  Gabi Nakibly and
                  Yuval Elovici},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Network-based intrusion detection systems go active!},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1004--1006},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382306},
  doi          = {10.1145/2382196.2382306},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MenahemNE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NakiblyKGB12,
  author       = {Gabi Nakibly and
                  Alex Kirshon and
                  Dima Gonikman and
                  Dan Boneh},
  title        = {Persistent {OSPF} Attacks},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/persistent-ospf-attacks},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NakiblyKGB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6324,
  author       = {Gabi Nakibly and
                  Fred L. Templin},
  title        = {Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement
                  and Proposed Mitigations},
  journal      = {{RFC}},
  volume       = {6324},
  pages        = {1--19},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6324},
  doi          = {10.17487/RFC6324},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/CohenN10,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {Maximizing restorable throughput in {MPLS} networks},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {18},
  number       = {2},
  pages        = {568--581},
  year         = {2010},
  url          = {http://doi.acm.org/10.1145/1816262.1816280},
  doi          = {10.1145/1816262.1816280},
  timestamp    = {Mon, 21 Jun 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/CohenN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/CohenN09,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {A traffic engineering approach for placement and selection of network
                  services},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {17},
  number       = {2},
  pages        = {487--500},
  year         = {2009},
  url          = {http://doi.acm.org/10.1145/1552193.1552203},
  doi          = {10.1145/1552193.1552203},
  timestamp    = {Mon, 08 Jun 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/CohenN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woot/NakiblyA09,
  author       = {Gabi Nakibly and
                  Michael Arov},
  editor       = {Dan Boneh and
                  Alexander Sotirov},
  title        = {Routing Loop Attacks using IPv6 Tunnels},
  booktitle    = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal,
                  Canada, August 10, 2009},
  pages        = {1--7},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/nakibly.pdf},
  timestamp    = {Wed, 24 May 2023 10:25:04 +0200},
  biburl       = {https://dblp.org/rec/conf/woot/NakiblyA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/CohenN08,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {On the computational complexity and effectiveness of N-hub shortest-path
                  routing},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {16},
  number       = {3},
  pages        = {691--704},
  year         = {2008},
  url          = {http://doi.acm.org/10.1145/1399562.1399578},
  doi          = {10.1145/1399562.1399578},
  timestamp    = {Tue, 05 Aug 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/CohenN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CohenN08,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {Maximizing Restorable Throughput in {MPLS} Networks},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {2324--2332},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.301},
  doi          = {10.1109/INFOCOM.2008.301},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CohenN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/il/Nakibly07,
  author       = {Gabi Nakibly},
  title        = {Traffic engineering in {IP} and {MPLS}},
  school       = {Technion - Israel Institute of Technology, Israel},
  year         = {2007},
  url          = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022926570203971},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/il/Nakibly07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CohenN07,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {A Traffic Engineering Approach for Placement and Selection of Network
                  Services},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {1793--1801},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.209},
  doi          = {10.1109/INFCOM.2007.209},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CohenN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CohenN04,
  author       = {Reuven Cohen and
                  Gabi Nakibly},
  title        = {On the Computational Complexity and Effectiveness of N-hub Shortest-Path
                  Routing},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, Hong Kong, China,
                  March 7-11, 2004},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/INFCOM.2004.1354540},
  doi          = {10.1109/INFCOM.2004.1354540},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CohenN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}