Florian Adamsky
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j2]Florian Adamsky, Matthieu Aubigny, Federica Battisti, Marco Carli, F. Cimorelli, Tiago Cruz, Alessandro Di Giorgio, Chiara Foglietta, A. Galli, Alessandro Giuseppi, Francesco Liberati, Alessandro Neri, Stefano Panzieri, Federica Pascucci, Jorge Proença, P. Pucci, Luís Rosa, Ridha Soua:
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach. IJCIP 21: 72-82 (2018) - [c8]Rocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel:
Machine Learning for Reliable Network Attack Detection in SCADA Systems. TrustCom/BigDataSE 2018: 633-638 - [c7]Teng Andrea Xu, Florian Adamsky, Ion Turcanu, Ridha Soua, Christian Köbel, Thomas Engel, Andrea Baiocchi:
Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet. VNC 2018: 1-2 - [c6]Florian Adamsky, Tatiana Retunskaia, Stefan Schiffner, Christian Köbel, Thomas Engel:
WLAN Device Fingerprinting using Channel State Information (CSI). WISEC 2018: 277-278 - 2016
- [b1]Florian Adamsky:
Analysis of bandwidth attacks in a bittorrent swarm. City University London, UK 2016 - 2015
- [c5]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. WOOT 2015 - 2014
- [j1]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Stealing bandwidth from BitTorrent seeders. Computers & Security 46: 126-140 (2014) - [c4]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Who Is Going to Be the Next BitTorrent Peer Idol? EUC 2014: 293-298 - 2012
- [c3]Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. CyberC 2012: 143-150 - 2011
- [c2]Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger:
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. ACM Conference on Computer and Communications Security 2011: 725-728 - 2010
- [c1]Christopher Köhnen, Christian Überall, Florian Adamsky, Veselin Rakocevic, Muttukrishnan Rajarajan, Rudolf Jäger:
Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs. ICCCN 2010: 1-6
Coauthor Index
last updated on 2019-02-07 21:48 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint