Related publications (53)

Global, Passive Detection of Connection Tampering

Louis-Henri Manuel Jakob Merino

In-network devices around the world monitor and tamper with connections for many reasons, including intrusion prevention, combating spam or phishing, and country-level censorship. Connection tampering seeks to block access to specific domain names or keywo ...
New York2023

Deplatforming did not decrease Parler users' activity on fringe social media

Robert West, Manoel Horta Ribeiro

Online platforms have banned ("deplatformed") influencers, communities, and even entire websites to reduce content deemed harmful. Deplatformed users often migrate to alternative platforms, which raises concerns about the effectiveness of deplatforming. He ...
OXFORD UNIV PRESS2023

Toward Internet Performance Transparency

Georgia Fragkouli

From medical support to education and remote work, our everyday lives increasingly depend on Internet performance. When users experience poor performance, however, the decentralization of the Internet allows limited visibility into which network is respons ...
EPFL2022

Encrypted DNS double right arrow Privacy? A Traffic Analysis Perspective

Carmela González Troncoso, Sandra Deepthy Siby, Narseo Vallina Rodriguez

Virtually every connection to an Internet service is preceded by a DNS lookup. Lookups are performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship. To address these issues, large organizations s ...
INTERNET SOC2020

Traffic Receipts for Network Transparency

Pavlos Nikolopoulos

Today's Internet is not transparent: when packets get lost or delayed, there is typically no information about where the problem occurred, hence no information about who is responsible. This results in Internet service providers (ISPs) offering service lev ...
EPFL2018

Towards Usable Checksums: Automating the Integrity Verification ofWeb Downloads for the Masses

Mathias Jacques Jean-Marc Humbert, Kévin Clément Huguenin, Igor Bilogrevic, Mauro Cherubini, Bertil Chapuis, Alexandre Meylan

Internet users can download software for their computers from app stores (e.g., Mac App Store and Windows Store) or from other sources, such as the developers' websites. Most Internet users in the US rely on the latter, according to our representative stud ...
ASSOC COMPUTING MACHINERY2018

Une mise en récit des comportements pour dessiner l’urbanité : regard sur les Pédibus en France et en Suisse Romande. La méthode de l’analyse du contenu comme décrypteur des web-discours

Eléonore Pigalle

« Pédibus… c’est pratique, agréable, ça maintient en forme, ça ne pollue pas ! » Cette campagne d'information et de sensibilisation du Pédibus reflète la mise à l’agenda des politiques publiques locales en faveur des déplacements à pied. Elle s’inscrit dan ...
2017

Fog Orchestration for Internet of Things Services

Tao Lin, Jie Xu

Large-scale Internet of Things (IoT) services such as healthcare, smart cities, and marine monitoring are pervasive in cyber-physical environments. These complex IoT services are increasingly composed of sensors, devices, and compute resources within fog c ...
Ieee Computer Soc2017

Towards a Principled Approach to Humanitarian Information and Communication Technology

Denis Gillet, Isabelle Barbara Marie-Hélène Cardia, Adrian Christian Holzer

The humanitarian sector is entering in the network age. The explosion in access to new information and communication technology (ICT) like mobile phones, the internet, and social media, is changing the way people communicate in emergency situations. Howeve ...
ACM2017

Governing Cybersecurity Risks and Benefits of the Internet of Things: Connected Medical and Health Devices and Connected Vehicles

Marie-Valentine Renée Agnès Florin

IRGC organised in 2016 an expert workshop on 'Governing Cybersecurity Risks and Benefits in the Internet of Things (IoT), applied to connected vehicles and medical devices. In those sectors, connectivity improves both safety and vulnerability, but cybersec ...
International Risk Governance Center2017

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.