Abstract is missing.
- ~Open Resolvers: Understanding the Origins of Anomalous Open DNS ResolversAndrew J. Kaizer, Minaxi Gupta. 3-14 [doi]
- Characterizing Optimal DNS Amplification Attacks and Effective MitigationDouglas C. MacFarland, Craig A. Shue, Andrew J. Kalafut. 15-27 [doi]
- Measuring BGP Route Origin Registration and ValidationDaniele Iamartino, Cristel Pelsser, Randy Bush. 28-40 [doi]
- On the Diversity of Interdomain Routing in AfricaRodérick Fanou, Pierre Francois, Emile Aben. 41-54 [doi]
- AppPrint: Automatic Fingerprinting of Mobile Applications in Network TrafficStanislav Miskovic, Gene Moo Lee, Yong Liao, Mario Baldi. 57-69 [doi]
- Uncovering the Footprints of Malicious Traffic in Cellular Data NetworksArun Raghuramu, Hui Zang, Chen-Nee Chuah. 70-82 [doi]
- Characterizing Instant Messaging Apps on SmartphonesLi Zhang, Chao Xu, Parth H. Pathak, Prasant Mohapatra. 83-95 [doi]
- Do Mobile Data Plans Affect Usage? Results from a Pricing Trial with ISP CustomersCarlee Joe-Wong, Sangtae Ha, Soumya Sen, Mung Chiang. 96-108 [doi]
- IPv6 AS Relationships, Cliques, and CongruenceVasileios Giotsas, Matthew J. Luckie, Bradley Huffaker, kc claffy. 111-122 [doi]
- Measuring and Characterizing IPv6 Router AvailabilityRobert Beverly, Matthew J. Luckie, Lorenza Mosley, kc claffy. 123-135 [doi]
- UAv6: Alias Resolution in IPv6 Using Unused AddressesRamakrishna Padmanabhan, Zhihao Li, Dave Levin, Neil Spring. 136-148 [doi]
- Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure Via Active FingerprintingRobert Beverly, Arthur Berger. 149-161 [doi]
- On the Power and Limitations of Detecting Network Filtering via Passive ObservationMatthew Sargent, Jakub Czyz, Mark Allman, Michael Bailey. 165-178 [doi]
- Distilling the Internet's Application Mix from Packet-Sampled TrafficPhilipp Richter, Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, Walter Willinger. 179-192 [doi]
- Enabling Internet-Wide Deployment of Explicit Congestion NotificationBrian Trammell, Mirja Kühlewind, Damiano Boppart, Iain Learmonth, Gorry Fairhurst, Richard Scheffenegger. 193-205 [doi]
- Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing ListRitwik Banerjee, Abbas Razaghpanah, Luis Chiang, Akassh Mishra, Vyas Sekar, Yejin Choi, Phillipa Gill. 206-219 [doi]
- Transparent Estimation of Internet Penetration from Network ObservationsSuso Benitez-Baleato, Nils B. Weidmann, Petros Gigis, Xenofontas Dimitropoulos, Eduard Glatz, Brian Trammell. 220-231 [doi]
- A Quantitative Study of Video Duplicate Levels in YouTubeYao Liu, Sam Blasiak, Weijun Xiao, Zhenhua Li, Songqing Chen. 235-248 [doi]
- Measuring YouTube from Dual-Stacked HostsSaba Ahsan, Vaibhav Bajpai, Jörg Ott, Jürgen Schönwälder. 249-261 [doi]
- Investigating Transparent Web Proxies in Cellular NetworksXing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David R. Choffnes, Ramesh Govindan. 262-276 [doi]
- TrackAdvisor: Taking Back Browsing Privacy from Third-Party TrackersTai-Ching Li, Huy Hang, Michalis Faloutsos, Petros Efstathopoulos. 277-289 [doi]
- Exploring Miner Evolution in Bitcoin NetworkLuqin Wang, Yong Liu. 290-302 [doi]
- Measuring the Performance of User Traffic in Home Wireless NetworksSrikanth Sundaresan, Nick Feamster, Renata Teixeira. 305-317 [doi]
- Enabling Wireless LAN TroubleshootingIlias Syrigos, Stratos Keranidis, Thanasis Korakis, Constantine Dovrolis. 318-331 [doi]
- Improving the Packet Send-Time Accuracy in Embedded DevicesRicky K. P. Mok, Weichao Li, Rocky K. C. Chang. 332-344 [doi]
- What You Need to Know About SDN Flow TablesMaciej Kuzniar, Peter Peresíni, Dejan Kostic. 347-359 [doi]
- Software-Defined Latency Monitoring in Data Center NetworksCurtis Yu, Cristian Lumezanu, Abhishek B. Sharma, Qiang Xu, Guofei Jiang, Harsha V. Madhyastha. 360-372 [doi]