A comprehensive survey of recent internet measurement techniques for cyber security

MS Pour, C Nader, K Friday, E Bou-Harb - Computers & Security, 2023 - Elsevier
As the Internet has transformed into a critical infrastructure, society has become more
vulnerable to its security flaws. Despite substantial efforts to address many of these …

Conceptualizing social protest and the significance of protest actions to large projects

P Hanna, F Vanclay, EJ Langdon, J Arts - The Extractive Industries and …, 2016 - Elsevier
In democratic societies, protest is a legitimate and necessary way for communities to seek
redress for issues that are ignored by decision-makers. In the wake of large projects …

Campus traffic and e-Learning during COVID-19 pandemic

T Favale, F Soro, M Trevisan, I Drago, M Mellia - Computer networks, 2020 - Elsevier
The COVID-19 pandemic led to the adoption of severe measures to counteract the spread of
the infection. Social distancing and lockdown measures modified people's habits, while the …

A tool for the generation of realistic network workload for emerging networking scenarios

A Botta, A Dainotti, A Pescapé - Computer Networks, 2012 - Elsevier
Internet workload is a mix of many and complex sources. Therefore, its accurate and realistic
replication is a difficult and challenging task. Such difficulties are exacerbated by the …

[LIBRO][B] The Internet and political protest in autocracies

NB Weidmann, EG Rød - 2019 - books.google.com
" Eight years after the Arab Spring there is still much debate over the link between Internet
technology and protest against authoritarian regimes. While the debate has advanced …

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks

J Czyz, M Kallitsis, M Gharaibeh… - Proceedings of the …, 2014 - dl.acm.org
Distributed Denial of Service (DDoS) attacks based on Network Time Protocol (NTP)
amplification, which became prominent in December 2013, have received significant global …

ICLab: A global, longitudinal internet censorship measurement platform

AA Niaki, S Cho, Z Weinberg, NP Hoang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Researchers have studied Internet censorship for nearly as long as attempts to censor
contents have taken place. Most studies have however been limited to a short period of time …

How dictators control the internet: a review essay

E Keremoğlu, NB Weidmann - Comparative Political Studies, 2020 - journals.sagepub.com
A growing body of research has studied how autocratic regimes interfere with internet
communication to contain challenges to their rule. In this review article, we survey the …

BGP anomaly detection techniques: A survey

B Al-Musawi, P Branch… - … Communications Surveys & …, 2016 - ieeexplore.ieee.org
The border gateway protocol (BGP) is the Internet's default inter-domain routing protocol that
manages connectivity among autonomous systems (ASes). Over the past two decades many …

Analyzing the Great Firewall of China over space and time

R Ensafi, P Winter, A Mueen… - Proceedings on privacy …, 2015 - petsymposium.org
A nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements
many different types of censorship and content filtering to control China's Internet traffic. Past …