RINALDI, G., ADAMSKY, F., SOUA, R., Baiocchi, A., & ENGEL, T. (2019). Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection. In 10th International Conference on Networks of the Future (NoF). doi:10.1109/NoF47743.2019.9014929 Peer reviewed |
Lopez Perez, R., ADAMSKY, F., SOUA, R., & ENGEL, T. (2019). Forget the Myth of the Air Gap: Machine Learningfor Reliable Intrusion Detection in SCADA Systems. EAI Endorsed Transactions on Security and Safety. Peer Reviewed verified by ORBi |
ADAMSKY, F., RETUNSKAIA, T., SCHIFFNER, S., & ENGEL, T. (2018). POSTER: WLAN Device Fingerprinting using Channel State Information (CSI). In 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec). doi:10.1145/3212480.3226099 Peer reviewed |
SOUA, R., TURCANU, I., ADAMSKY, F., Führer, D., & ENGEL, T. (2018). Multi-Access Edge Computing for Vehicular Networks: a Position Paper. In 2018 IEEE Global Communications Conference: Workshops: Vehicular Networking and Intelligent Transportation Systems. doi:10.1109/GLOCOMW.2018.8644392 Peer reviewed |
Xu, T. A., ADAMSKY, F., TURCANU, I., Soua, R., Köbel, C., ENGEL, T., & Baiocchi, A. (2018). Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet [Poster presentation]. IEEE Vehicular Networking Conference (VNC) 2018. doi:10.1109/VNC.2018.8628414 |
Lopez Perez, R., ADAMSKY, F., SOUA, R., & ENGEL, T. (2018). Machine Learning for Reliable Network Attack Detection in SCADA Systems. In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18). Peer reviewed |
ADAMSKY, F., Aubigny, M., Battisti, F., Carli, M., Cimorelli, F., Cruz, T., Di Giorgio, A., Foglietta, C., Galli, A., Giuseppi, A., Liberati, F., Neri, A., Panzieri, S., Pascucci, F., Proenca, J., Pucci, P., Rosa, L., & SOUA, R. (2018). Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach. International Journal of Critical Infrastructure Protection. doi:10.1016/j.ijcip.2018.04.004 Peer reviewed |
ADAMSKY, F. (2016). Analysis of Bandwidth Attacks in a Bittorrent Swarm [Doctoral thesis, City University London]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/32710 |
ADAMSKY, F., Khayam, S. A., Jäger, R., & Rajarajan, M. (2015). P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. In USENIX Workshop on Offensive Technologies (WOOT '15). Peer reviewed |
ADAMSKY, F., Khayam, S. A., Jäger, R., & Rajarajan, M. (2014). Stealing Bandwidth from BitTorrent Seeders. Computers and Security. doi:10.1016/j.cose.2014.07.009 Peer Reviewed verified by ORBi |
ADAMSKY, F., Khayam, A., Jäger, R., & Rajarajan, M. (2012). Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver. In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover (CyberC). doi:10.1109/CyberC.2012.31 Peer reviewed |
ADAMSKY, F., Köhnen, C., Überall, C., Rakocevic, V., Rajarajan, M., & Jäger, R. (2011). A Novel Concept for Hybrid Quality Improvements in Consumer Networks. In ICCE-Berlin 2011: 2011 IEEE International Conference on Consumer Electronics - Berlin (ICCE-Berlin). doi:10.1109/ICCE-Berlin.2011.6031799 Peer reviewed |
ADAMSKY, F., Khan, H., Rajarajan, M., Khayam, A., & Jäger, R. (2011). POSTER: Destabilizing BitTorrent’s Clusters to Attack High Bandwidth Leechers. In In 18th ACM Conference on Computer and Communications Security (ACM CCS). Peer reviewed |
Köhnen, C., Überall, C., ADAMSKY, F., Rakocevic, V., Rajarajan, M., & Jäger. (2010). Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs. In ICCCN 2010 Track on Network Algorithms, Performance Evaluation and Theory (NAPET) (ICCCN 2010 NAPET). doi:10.1109/ICCCN.2010.5560139 Peer reviewed |