Items where Author is "Khayam, S. A."
Article
Adamsky, F., Khayam, S. A., Jaeger, R. & Rajarajan, M. (2014). Stealing bandwidth from BitTorrent seeders. Computers & Security, 46, pp. 126-140. doi: 10.1016/j.cose.2014.07.009
Qureshi, H. K., Rizvi, S., Saleem, M. , Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2013). Evaluation and improvement of CDS-based topology control for wireless sensor networks. Wireless Networks, 19(1), pp. 31-46. doi: 10.1007/s11276-012-0449-9
Rizvi, S., Qureshi, H. K., Khayam, S. A. , Rakocevic, V. & Rajarajan, M. (2012). A1: An energy efficient topology control algorithm for connected area coverage in wireless sensor networks. Journal of Network and Computer Applications, 35(2), pp. 597-605. doi: 10.1016/j.jnca.2011.11.003
Qureshi, H. K., Rizvi, S., Saleem, M. , Khayam, S. A., Rakocevic, V. & Rajarajan, M. (2011). Poly: A Reliable and Energy Efficient Topology Control Protocol for Wireless Sensor Networks. Computer Communications, 34(10), pp. 1235-1242. doi: 10.1016/j.comcom.2010.12.016
Conference or Workshop Item
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2014). Who is going to be the next BitTorrent Peer Idol?. Paper presented at the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 26-08-2014 - 28-08-2014, Milan, Italy.
Adamsky, F., Khayam, S. A., Jager, R. & Rajarajan, M. (2012). Security analysis of the micro transport protocol with a misbehaving receiver. Paper presented at the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, 10 - 12 October 2012, Sanya, China. doi: 10.1109/CyberC.2012.31
Rajarajan, M., Adamsky, F., Khan, H. , Khayam, S. A. & Jager, R. (2011). Destabilizing BitTorrent's clusters to attack high bandwidth lechers. Poster presented at the 18th ACM Conference on Computer and Communications Security (CCS 2011), 17 Oct 2011 - 21 Oct 2011, SWISSÔTEL Chicago, Chicago, IL, USA.