skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Briggs, Michael"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Key Points A framework merging unsupervised clustering and supervised convolutional neural network (CNN) for lightning classification is developed Clustering of positive polarity energetic lightning radio pulses (>150 kA) identifies three processes: +EIPs (6%–7%), +NBEs, and +CGs CNNs detect 95.2% of manually identified +EIPs with up to 98.7% accuracy, enabling studying EIP‐TGF link with lower peak current (>50 kA) 
    more » « less
  2. null (Ed.)
    Networks not employing destination-side source address validation (DSAV) expose themselves to a class of pernicious attacks which could be easily prevented by filtering inbound traffic purporting to originate from within the network. In this work, we survey the pervasiveness of networks vulnerable to infiltration using spoofed addresses internal to the network. We issue recursive Domain Name System (DNS) queries to a large set of known DNS servers worldwide, using various spoofed-source addresses. We classify roughly half of the 62,000 networks (autonomous systems) we tested as vulnerable to infiltration due to lack of DSAV. As an illustration of the dangers these networks expose themselves to, we demonstrate the ability to fingerprint the operating systems of internal DNS servers. Additionally, we identify nearly 4,000 DNS server instances vulnerable to cache poisoning attacks due to insufficient---and often non-existent---source port randomization, a vulnerability widely publicized 12 years ago. 
    more » « less
  3. Abstract Many of the details of how terrestrial gamma‐ray flashes (TGFs) are produced, including their association with upward‐propagating in‐cloud lightning leader channels, remain poorly understood. Measurements of the low‐frequency radio emissions associated with TGF production continue to provide unique views and key insights into the electrodynamics of this process. Here we report further details on the connection between energetic in‐cloud pulses (EIPs) and TGFs. With coordinated measurements from both ground‐based radio sensors and space‐based gamma‐ray detectors on the Fermi and Reuven Ramaty High Energy Solar Spectroscopic Imager spacecraft, we find that all ten +EIPs that occurred within the searched space‐and‐time window are associated with simultaneous TGFs, including two new TGFs that were not previously identified by the gamma‐ray measurements alone. The results in this study not only solidify the tight connection between +EIPs and TGFs, but also demonstrate the practicability of detecting a subpopulation of TGFs with ground‐based radio sensors alone. 
    more » « less