Status and performance of the ShakeAlert earthquake early warning system: 2019–2023

AI Lux, D Smith, M Böse, JJ McGuire… - Bulletin of the …, 2024 - pubs.geoscienceworld.org
ABSTRACT The US Geological Survey (USGS)‐operated ShakeAlert® system is the United
States West Coast earthquake early warning system. In this study we detail ShakeAlert's …

Using game theory to model DoS attack and defence

B Kumar, B Bhuyan - Sādhanā, 2019 - Springer
Denial of service (DoS) or distributed denial of service (DDoS) attacks based on bandwidth
depletion remain a persistent network security threat and have always been an important …

Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming

Z Wang, L Sun, C Wu, W Zhu… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Dynamic adaptive video streaming has emerged as a popular approach for video streaming
in today's Internet. To date the two important components in dynamic adaptive streaming …

A joint online transcoding and delivery approach for dynamic adaptive streaming

Z Wang, L Sun, C Wu, W Zhu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Dynamic adaptive streaming has emerged as a popular approach for video services in
today's Internet. To date, the two important components in dynamic adaptive streaming …

Identifying proxy nodes in a Tor anonymization circuit

S Chakravarty, A Stavrou… - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
We present a novel, practical, and effective mechanism that exposes the identity of Tor
relays participating in a given circuit. Such an attack can be used by malicious or …

TCP congestion signatures

S Sundaresan, M Allman, A Dhamdhere… - Proceedings of the 2017 …, 2017 - dl.acm.org
We develop and validate Internet path measurement techniques to distinguish congestion
experienced when a flow self-induces congestion in the path from when a flow is affected by …

Is it congestion or a DDoS attack?

A Shevtekar, N Ansari - IEEE Communications Letters, 2009 - ieeexplore.ieee.org
We propose a new stealthy DDoS attack model referred to as the" quiet" attack. The attack
traffic consists of TCP traffic only. Widely used botnets in today's various attacks and newly …

Systems and methods for computing data transmission characteristics of a network path based on single-ended measurements

AD Keromytis, S Chakravarty, A Stavrou - US Patent 7,660,261, 2010 - Google Patents
Systems and methods for computing data transmission char acteristics of a network path are
disclosed. In some embodi ments, the network path has a sending host, at least one …

An end-to-end measurement and monitoring technique for the bottleneck link capacity and its available bandwidth

JC Kim, Y Lee - Computer Networks, 2014 - Elsevier
An efficient and accurate measurement technique for the network bandwidths information
can be utilized for various areas including the application layer services improvement …

On powering communication networks in develo** regions

A Nungu, R Olsson, B Pehrson - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
The work behind this paper aims at demonstrating innovative solutions for the establishment
of sustainable community broadband networks in areas where there is demand but no …