1. POSTER: destabilizing BitTorrent's clusters to attack high bandwidth leechers;Adamsky,2011
2. Security analysis of the micro transport protocol with a misbehaving receiver;Adamsky,2012
3. Who is going to be the next BitTorrent Peer Idol?;Adamsky,2014
4. Free riding on gnutella;Adar;First Monday,2000
5. Key words for use in RFCs to indicate requirement levels;Bradner,1997