Prof. Dr. Florian Adamsky

Peer-Reviewed Publications


  • Softwarization of SCADA: Lightweight Statistical SDN-Agents for Anomaly Detection: Rinaldi, Giulia; Adamsky, Florian; Soua, Ridha; Baiocchi, Andrea; Engel, Thomas: In 9th International Conference on Network of the Future (IEEE NoF), 2019
  • Experimental Evaluation of Floating Car Data Collection Protocols in Vehicular Networks: Turcanu, Ion; Adamsky, Florian; Engel, Thomas: In IEEE VTC, 2019
  • Forget the Myth of the Air Gap: Machine Learning for Reliable Intrusion Detection in SCADA Systems: Perez, R., Adamsky Florian, Soua R., and Engel T.: EAI Endorsed Transactions on Security and Safety, 2019 [PDF] [BibTex]
  • Poster: WLAN Device Fingerprinting using Channel State Information (CSI): Adamsky Florian., Retunskaia T., Schiffner S., and Engel T.: In 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec), 2018 (Best Poster Award)
  • Poster: Performance Evaluation of an Open-Source AVB/TSN Testbed for Automotive Ethernet: Xu A., Adamsky Florian, Turcanu I., Soua R., Köbel C., Engel T., and Baiocchi A.: In IEEE Vehicular Networking Conference (IEEE VNC), 2018
  • Machine Learning for Reliable Network Attack Detection in SCADA Systems: Perez, R., Adamsky F., Soua R., and Engel T.: In 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2018
  • Multi-Access Edge Computing for Vehicular Networks: a Position Paper: Soua R., Turcanu I., Adamsky F., Führer D., and Engel T.: In IEEE GLOBECOM 2018 Workshops: Vehicular Networking and Intelligent Transportation Systems, 2018
  • Integrated Protection of Industrial Control Systems from Cyber-attacks: the ATENA Approach: Adamsky F., Aubigny M., Battisti F., Carli M., Cimorelli F., Cruz T., Giorgio A., Foglietta C., Galli A., Giuseppi A., Liberati F., Neri A., Panzieri S., Pascucci F., Proença J., Pucci P., Rosa L., Soua R.: In Elsevier International Journal of Critical Infrastructure, 2018
  • P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In 9th USENIX Workshop on Offensive Technologies (WOOT '15), Washington, D.C., USA (acceptance rate of 35 %) [pdf] [slides] [bibtex]
  • Stealing Bandwidth from BitTorrent Seeders: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In Elsevier Journal Computers & Security [pdf] [Link]
  • Who is going to be the next BitTorrent Peer Idol?: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In 12th IEEE International Conference on Embedded and Ubiquitous Computing, Milan, Italy. [pdf] [poster]
  • Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver: Adamsky F.; Khayam S.; Jäger. R. Rajarajan, M.: In CyberC 2012, China (acceptance rate of 27 %) [pdf] [slides]
  • POSTER: Destabilizing BitTorrent's Clusters to Attack High Bandwidth Leechers: Adamsky F.; Khan H.; Rajarajan, M.; Khayam S.; Jäger. R.: In 18th ACM Conference on Computer and Communications Security, USA [pdf] [poster]
  • A Novel Concept for Hybrid Quality Improvements in Consumer Networks: Adamsky, F.; Köhnen, C.; Überall, C.; Rakocevic, V.; Rajarajan, M.; Jäger, R.: In ICCE 2011 Berlin, 09 2011 [pdf] [slides] [bibtex]
  • Enhancements to Statistical Protocol IDentification (SPID) for Self-Organised QoS in LANs: Köhnen, C.; Überall, C.; Adamsky, F.; Rakocevic, V.; Rajarajan, M.; Jäger, R.: In ICCCN 2010 NAPET. Zurich, Switzerland, 8 2010 [pdf] [bibtex]

Prof. Dr. Florian Adamsky | University of Applied Science Hof

Prof. Dr. Florian Adamsky

Department of Computer Science
Computer Science

Hochschule Hof
Alfons-Goppel-Platz 1
95028 Hof

Room: G 134
Phone +49 (0) 9281 / 409 4860
Fax: +49 (0) 9281 / 409 55 4860
E-Mail: florian.adamskyhof-university.LÖ

Office hours

only by registration via e-mail

Teaching area / Field

IT Security


IT-Security Officer



Campus Hof

95028 Hof

Campus Münchberg

Kulmbacher Str. 76
95213 Münchberg