Profil

ADAMSKY Florian

Main Referenced Co-authors
ENGEL, Thomas  (6)
Rajarajan, Muttukrishnan (6)
Jäger, Rudolf (5)
SOUA, Ridha  (5)
Baiocchi, Andrea (2)
Main Referenced Keywords
Anomaly detection (3); SCADA (2); Agent/probes (1); Audio Video Bridging (1); Automotive Ethernet (1);
Main Referenced Disciplines
Computer science (14)

Publications (total 14)

The most downloaded
964 downloads
Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). https://hdl.handle.net/10993/35719

The most cited

49 citations (Scopus®)

Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). https://hdl.handle.net/10993/35719

Rinaldi, G., Adamsky, F., Soua, R., Baiocchi, A., & Engel, T. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection. In 10th International Conference on Networks of the Future (NoF). doi:10.1109/NoF47743.2019.9014929
Peer reviewed

Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2019). Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems. EAI Endorsed Transactions on Security and Safety.
Peer Reviewed verified by ORBi

Adamsky, F., Retunskaia, T., Schiffner, S., & Engel, T. (2018). POSTER: WLAN Device Fingerprinting using Channel State Information (CSI). In 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec). doi:10.1145/3212480.3226099
Peer reviewed

Soua, R., Turcanu, I., Adamsky, F., Führer, D., & Engel, T. (2018). Multi-Access Edge Computing for Vehicular Networks: a Position Paper. In 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems. doi:10.1109/GLOCOMW.2018.8644392
Peer reviewed

Lopez Perez, R., Adamsky, F., Soua, R., & Engel, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18).
Peer reviewed

Adamsky, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & Soua, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. International Journal of Critical Infrastructure Protection. doi:10.1016/j.ijcip.2018.04.004
Peer reviewed

Xu, T. A., Adamsky, F., Turcanu, I., Soua, R., Köbel, C., Engel, T., & Baiocchi, A. (2018). Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet [Poster presentation]. IEEE Vehicular Networking Conference (VNC) 2018. doi:10.1109/VNC.2018.8628414

Adamsky, F. (2016). Analysis of Bandwidth Attacks in a Bittorrent Swarm [Doctoral thesis, City University London]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/32710

Adamsky, F., Khayam, S. A., Jäger, R., & Rajarajan, M. (2015). P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. In USENIX Workshop on Offensive Technologies (WOOT '15).
Peer reviewed

Adamsky, F., Khayam, S. A., Jäger, R., & Rajarajan, M. (2014). Stealing Bandwidth from BitTorrent Seeders. Computers and Security. doi:10.1016/j.cose.2014.07.009
Peer Reviewed verified by ORBi

Adamsky, F., Khayam, A., Jäger, R., & Rajarajan, M. (2012). Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover (CyberC). doi:10.1109/CyberC.2012.31
Peer reviewed

Adamsky, F., Köhnen, C., Überall, C., Rakocevic, V., Rajarajan, M., & Jäger, R. (2011). A Novel Concept for Hybrid Quality Improvements in Consumer Networks. In ICCE-Berlin 2011: 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin). doi:10.1109/ICCE-Berlin.2011.6031799
Peer reviewed

Adamsky, F., Khan, H., Rajarajan, M., Khayam, A., & Jäger, R. (2011). POSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth Leechers. In In 18th ACM Conference on Computer and Communications Security (ACM CCS).
Peer reviewed

Köhnen, C., Überall, C., Adamsky, F., Rakocevic, V., Rajarajan, M., & Jäger. (2010). Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs. In ICCCN 2010 Track on Network Algorithms, Performance Evaluation and Theory (NAPET) (ICCCN 2010 NAPET). doi:10.1109/ICCCN.2010.5560139
Peer reviewed

Contact ORBilu