References of "Adamsky, Florian 50024439"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailPOSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Adamsky, Florian UL; Retunskaia, Tatiana UL; Schiffner, Stefan UL et al

in 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec) (2018, June)

Detailed reference viewed: 114 (11 UL)
Full Text
Peer Reviewed
See detailMulti-Access Edge Computing for Vehicular Networks: a Position Paper
Soua, Ridha UL; Turcanu, Ion UL; Adamsky, Florian UL et al

in 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems (2018)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailMachine Learning for Reliable Network Attack Detection in SCADA Systems
Lopez Perez, Rocio; Adamsky, Florian UL; Soua, Ridha UL et al

in 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (2018)

Detailed reference viewed: 122 (13 UL)
Full Text
Peer Reviewed
See detailIntegrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach
Adamsky, Florian UL; Aubigny, Matthieu; Battisti, Federica et al

in Elsevier International Journal of Critical Infrastructure Protection (2018)

Detailed reference viewed: 61 (4 UL)
See detailAnalysis of Bandwidth Attacks in a Bittorrent Swarm
Adamsky, Florian UL

Doctoral thesis (2016)

Detailed reference viewed: 52 (8 UL)
Full Text
Peer Reviewed
See detailP2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
Adamsky, Florian UL; Khayam, Syed Ali; Jäger, Rudolf et al

in USENIX Workshop on Offensive Technologies (WOOT '15) (2015)

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailStealing Bandwidth from BitTorrent Seeders
Adamsky, Florian UL; Khayam, Syed Ali; Jäger, Rudolf et al

in Computers & Security (2014)

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailSecurity Analysis of the Micro Transport Protocol with a Misbehaving Receiver
Adamsky, Florian UL; Khayam, Ali; Jäger, Rudolf et al

in International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover (CyberC) (2012)

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailPOSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth Leechers
Adamsky, Florian UL; Khan, Hassan; Rajarajan, Muttukrishnan et al

in In 18th ACM Conference on Computer and Communications Security (ACM CCS) (2011)

Detailed reference viewed: 23 (0 UL)
Full Text
Peer Reviewed
See detailA Novel Concept for Hybrid Quality Improvements in Consumer Networks
Adamsky, Florian UL; Köhnen, Christopher; Überall, Christian et al

in ICCE-Berlin 2011: 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin) (2011)

Detailed reference viewed: 10 (2 UL)
Full Text
Peer Reviewed
See detailEnhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs
Köhnen, Christopher; Überall, Christian; Adamsky, Florian UL et al

in ICCCN 2010 Track on Network Algorithms, Performance Evaluation and Theory (NAPET) (ICCCN 2010 NAPET) (2010)

Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home ... [more ▼]

Since most real-time audio and video applications lack of QoS support, QoS demand of such IP data streams shall be detected and applied automatically. To support QoS in LANs, especially in home environments, a system was developed, which enables self-organised QoS for unmanaged networks through host implementations - in contrast to traditional solutions without network support. It supports per-link reservation and prioritisation and works without a need for application support. One part of this system is an automated traffic identification and classification system, which is subject of this paper. An efficient set of attribute meters, based on the Statistical Protocol IDentification (SPID), was investigated, enhanced and evaluated. We improved the performance, added support for UDP protocols and real-time identification. It is shown that using our implementation efficient near real-time protocol identification on per-flow basis is possible to support self-organised resource reservation. [less ▲]

Detailed reference viewed: 5 (0 UL)