Abstract is missing.
- Selective Capping of Packet Payloads for Network Analysis and ManagementVíctor Uceda, Miguel Rodríguez, Javier Ramos, José Luis García-Dorado, Javier Aracil. 3-16 [doi]
- Youtube Revisited: On the Importance of Correct Measurement MethodologyOssi Karkulahti, Jussi Kangasharju. 17-30 [doi]
- Zen and the Art of Network Troubleshooting: A Hands on Experimental StudyFrançois Espinet, Diana Joumblatt, Dario Rossi. 31-45 [doi]
- Vivisecting WhatsApp in Cellular Networks: Servers, Flows, and Quality of ExperiencePierdomenico Fiadino, Mirko Schiavone, Pedro Casas. 49-63 [doi]
- Device-Specific Traffic Characterization for Root Cause Analysis in Cellular NetworksPeter Romirer-Maierhofer, Mirko Schiavone, Alessandro D'Alconzo. 64-78 [doi]
- Tracking Middleboxes in the Mobile World with TraceboxAndroidValentin Thirion, Korian Edeline, Benoit Donnet. 79-91 [doi]
- Assessing Affinity Between Users and CDN SitesXun Fan, Ethan Katz-Bassett, John S. Heidemann. 95-110 [doi]
- The Online Tracking Horde: A View from Passive MeasurementsHassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, Mario Baldi. 111-125 [doi]
- SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name GraphsTatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto. 126-139 [doi]
- Monitoring Internet Censorship with UBICAGiuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad B. Qaisar. 143-157 [doi]
- How Dangerous Is Internet Scanning? - A Measurement Study of the Aftermath of an Internet-Wide ScanElias Raftopoulos, Eduard Glatz, Xenofontas Dimitropoulos, Alberto Dainotti. 158-172 [doi]
- Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking AttacksJohann Schlamp, Ralph Holz, Oliver Gasser, Andreas Korsten, Quentin Jacquemart, Georg Carle, Ernst W. Biersack. 173-187 [doi]
- The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names ExpireJohann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle. 188-201 [doi]
- DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier NetworksTimm Böttger, Lothar Braun, Oliver Gasser, Felix von Eye, Helmut Reiser, Georg Carle. 205-218 [doi]
- Measuring DANE TLSA DeploymentLiang Zhu, Duane Wessels, Allison Mankin, John S. Heidemann. 219-232 [doi]
- A First Look at Real Multipath TCP TrafficBenjamin Hesmans, Hoang Tran-Viet, Ramin Sadre, Olivier Bonaventure. 233-246 [doi]