Items where Author is "Adamsky, F."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Item Type | No Grouping
Number of items: 4.

Article

Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Conference or Workshop Item

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China.

Rajarajan, M., Adamsky, F., Khan, H., Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

This list was generated on Fri Apr 28 06:31:18 2017 UTC.