A comprehensive survey of recent internet measurement techniques for cyber security
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …
vulnerable to its security flaws. Despite substantial efforts to address many of these …
Conceptualizing social protest and the significance of protest actions to large projects
In democratic societies, protest is a legitimate and necessary way for communities to seek
redress for issues that are ignored by decision-makers. In the wake of large projects …
redress for issues that are ignored by decision-makers. In the wake of large projects …
Campus traffic and e-Learning during COVID-19 pandemic
The COVID-19 pandemic led to the adoption of severe measures to counteract the spread of
the infection. Social distancing and lockdown measures modified people's habits, while the …
the infection. Social distancing and lockdown measures modified people's habits, while the …
A tool for the generation of realistic network workload for emerging networking scenarios
Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic
replication is a difficult and challenging task. Such difficulties are exacerbated by the …
replication is a difficult and challenging task. Such difficulties are exacerbated by the …
[LIBRO][B] The Internet and political protest in autocracies
NB Weidmann, EG Rød - 2019 - books.google.com
" Eight years after the Arab Spring there is still much debate over the link between Internet
technology and protest against authoritarian regimes. While the debate has advanced …
technology and protest against authoritarian regimes. While the debate has advanced …
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP)
amplification, which became prominent in December 2013, have received significant global …
amplification, which became prominent in December 2013, have received significant global …
ICLab: A global, longitudinal internet censorship measurement platform
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …
contents have taken place. Most studies have however been limited to a short period of time …
How dictators control the internet: a review essay
A growing body of research has studied how autocratic regimes interfere with internet
communication to contain challenges to their rule. In this review article, we survey the …
communication to contain challenges to their rule. In this review article, we survey the …
BGP anomaly detection techniques: A survey
The border gateway protocol (BGP) is the Internet's default inter-domain routing protocol that
manages connectivity among autonomous systems (ASes). Over the past two decades many …
manages connectivity among autonomous systems (ASes). Over the past two decades many …
Analyzing the Great Firewall of China over space and time
A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements
many different types of censorship and content filtering to control China's Internet traffic. Past …
many different types of censorship and content filtering to control China's Internet traffic. Past …