Florian Adamsky

Orcid: 0009-0002-6642-6904

According to our database1, Florian Adamsky authored at least 22 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Presshammer: Rowhammer and Rowpress Without Physical Address Information.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

2023
Examining the Hydra: Simultaneously Shared Links in Tor and the Effects on its Performance.
Proc. Priv. Enhancing Technol., July, 2023

Towards an Empirical Study to Determine the Effectiveness of Support Systems against E-Mail Phishing Attacks.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-App.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2021
Work in Progress: Can Johnny Encrypt E-Mails on Smartphones?
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

2020
Locust: Highly Concurrent DHT Experimentation Framework for Security Evaluations.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

Tracking Without Traces - Fingerprinting in an Era of Individualism and Complexity.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems.
EAI Endorsed Trans. Security Safety, 2019

Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection.
Proceedings of the 10th International Conference on Networks of the Future, 2019

2018
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach.
Int. J. Crit. Infrastructure Prot., 2018

WLAN Device Fingerprinting using Channel State Information (CSI).
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Poster: Performance Evaluation of an Open-Source Audio-Video Bridging/Time-Sensitive Networking Testbed for Automotive Ethernet.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Machine Learning for Reliable Network Attack Detection in SCADA Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Multi-Access Edge Computing for Vehicular Networks: A Position Paper.
Proceedings of the IEEE Globecom Workshops, 2018

2016
Analysis of bandwidth attacks in a bittorrent swarm.
PhD thesis, 2016

2015
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

2014
Stealing bandwidth from BitTorrent seeders.
Comput. Secur., 2014

Who Is Going to Be the Next BitTorrent Peer Idol?
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

2012
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010


  Loading...