Items where Author is "Adamsky, F."
Article
Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009
Conference or Workshop Item
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31
Rajarajan, M., Adamsky, F., Khan, H. , Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.