City Research Online

Items where Author is "Adamsky, F."

Up a level
Group by: Type | No Grouping
Number of items: 4.

Adamsky, F., Khayam, S. A., Jaeger, R. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009

Adamsky, F., Khayam, S. A., Jager, R. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.

Adamsky, F., Khayam, S. A., Jager, R. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31

Rajarajan, M., Adamsky, F., Khan, H. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.

This list was generated on Tue May 6 04:33:55 2025 UTC.