Redirection and protocol mechanisms in content delivery network-edge servers for adaptive video streaming

M Taha, A Ali - Applied Sciences, 2023 - mdpi.com
Redirection and protocol techniques are key components of the infrastructure for Content
Delivery Networks (CDNs) that aid in the delivery of Multimedia Internet services to end …

ExEC: Elastic extensible edge cloud

A Zavodovski, N Mohan, S Bayhan, W Wong… - Proceedings of the 2Nd …, 2019 - dl.acm.org
Edge computing (EC) extends the centralized cloud computing paradigm by bringing
computation into close proximity to the end-users, to the edge of the network, and is a key …

CDN-hosted domain detection with supervised machine learning through DNS records

H Li, L He, H Zhang, K Zhang, X Li, C He - Proceedings of the 3rd …, 2020 - dl.acm.org
Content delivery network (CDN) has become a critical infrastructure in the Internet and DNS-
based request routing mechanism is widely used in CDNs. The current methods of CDN …

System, apparatus and method to support data server selection

ND Dao - US Patent 11,218,438, 2022 - Google Patents
A communication system includes a user plane function (UPF) configured to receive a
domain name system (DNS) query from a user equipment (UE). The DNS query includes a …

Intelligent resource management at the network edge using content delivery networks

M Abbasi, MR Khosravi, A Ramezani - Enterprise Information …, 2023 - Taylor & Francis
In a distributed denial-of-service attack, a large volume of packets is sent to the victim server
to prevent service delivery and make it unavailable to valid users and clients at the network …

NSEN: Improving Session Efficiency in Distributed MEC Networks

J Ye, H Zhang, W Hu, Q Yue, Q Wang - IEEE Network, 2022 - ieeexplore.ieee.org
The rapid development of 5G technology and edge computing prompts emerging edge
applications with heterogeneous requirements for network services with respect to latency …

How We Ruined The Internet

M Beck, T Moore - arXiv preprint arXiv:2306.01101, 2023 - arxiv.org
At the end of the 19th century the logician CS Peirce coined the term" fallibilism" for the"...
the doctrine that our knowledge is never absolute but always swims, as it were, in a …

Location, location, location! Copyright content moderation at non-content layers

SF Schwemer - The Routledge handbook of EU copyright law, 2021 - taylorfrancis.com
In the moderation and enforcement of copyright content, online platforms as well as internet
access service providers play a prominent role. This chapter looks at less prominently …

An empirical study of mobile network behavior and application performance in the wild

S Zhang, W Li, D Wu, B Jin, RKC Chang… - Proceedings of the …, 2019 - dl.acm.org
Monitoring mobile network performance is critical for optimizing the QoE of mobile apps.
Until now, few studies have considered the actual network performance that mobile apps …

An insight into the Fast-Flux Attack Networks and the applied cyber defensive practices

G Charisopoulos - 2024 - repository.ihu.edu.gr
Written as part of my MSc degree in Cybersecurity at International Hellenic University, this
dissertation focuses on the operation and detection of a special category of malicious …