Abstract is missing.
- Inter-Domain Traffic Estimation for the OutsiderMario A. Sánchez, Fabián E. Bustamante, Balachander Krishnamurthy, Walter Willinger, Georgios Smaragdakis, Jeffrey Erman. 1-14 [doi]
- Challenges in Inferring Internet Interdomain CongestionMatthew J. Luckie, Amogh Dhamdhere, David D. Clark, Bradley Huffaker, kc claffy. 15-22 [doi]
- Inferring Complex AS RelationshipsVasileios Giotsas, Matthew J. Luckie, Bradley Huffaker, kc claffy. 23-30 [doi]
- Peering at Peerings: On the Role of IXP Route ServersPhilipp Richter, Georgios Smaragdakis, Anja Feldmann, Nikolaos Chatzis, Jan Böttger, Walter Willinger. 31-44 [doi]
- Measuring the Reliability of Mobile Broadband NetworksDziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein. 45-58 [doi]
- Behind the Curtain: Cellular DNS and Content Replica SelectionJohn P. Rula, Fabian E. Bustamante. 59-72 [doi]
- Need, Want, Can Afford: Broadband Markets and the Behavior of UsersZachary S. Bischof, Fabian E. Bustamante, Rade Stanojevic. 73-86 [doi]
- When the internet sleeps: correlating diurnal networks with external factorsLin Quan, John S. Heidemann, Yuri Pradkin. 87-100 [doi]
- WhoWas: A Platform for Measuring Web Deployments on IaaS CloudsLiang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, Aditya Akella. 101-114 [doi]
- Towards Network-level Efficiency for Cloud Storage ServicesZhenhua Li, Cheng Jin, Tianyin Xu, Christo Wilson, Yao Liu, Linsong Cheng, Yunhao Liu, Yafei Dai, Zhi-Li Zhang. 115-128 [doi]
- Paying for Likes?: Understanding Facebook Like Fraud Using HoneypotsEmiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq. 129-136 [doi]
- Whispers in the dark: analysis of an anonymous social networkGang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao. 137-150 [doi]
- QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer AnalysisQi Alfred Chen, Haokun Luo, Sanae Rosen, Zhuoqing Morley Mao, Karthik Iyer, Jie Hui, Kranthi Sontineni, Kevin Lau. 151-164 [doi]
- A First Look at Performance in Mobile Virtual Network OperatorsFatima Zarinni, Ayon Chakraborty, Vyas Sekar, Samir R. Das, Phillipa Gill. 165-172 [doi]
- OS Fingerprinting and Tethering Detection in Mobile NetworksYi-Chao Chen, Yong Liao, Mario Baldi, Sung-Ju Lee, Lili Qiu. 173-180 [doi]
- WiFi, LTE, or Both?: Measuring Multi-Homed Wireless Internet PerformanceShuo Deng, Ravi Netravali, Anirudh Sivaraman, Hari Balakrishnan. 181-194 [doi]
- Node Failure Localization via Network TomographyLiang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, Jessica Lowe. 195-208 [doi]
- Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity RegionHao Wu, Hsu-Chun Hsiao, Yih-Chun Hu. 209-222 [doi]
- Crossroads: A Practical Data Sketching Solution for Mining Intersection of StreamsZhenglin Yu, Zihui Ge, Ashwin Lall, Jia Wang, Jun (Jim) Xu, He Yan. 223-234 [doi]
- OFSS: Skampling for the Flow Size DistributionPaul Tune, Darryl Veitch. 235-240 [doi]
- Dissecting Web Latency in GhanaYasir Zaki, Jay Chen, Thomas Pötsch, Talal Ahmad, Lakshminarayanan Subramanian. 241-248 [doi]
- How Much Can We Micro-Cache Web Pages?Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall. 249-256 [doi]
- Back-Office Web Traffic on The InternetEnric Pujol, Philipp Richter, Balakrishnan Chandrasekaran, Georgios Smaragdakis, Anja Feldmann, Bruce MacDowell Maggs, Keung-Chi Ng. 257-270 [doi]
- A Look at the Consequences of Internet Censorship Through an ISP LensSheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson. 271-284 [doi]
- Censorship in the Wild: Analyzing Internet Filtering in SyriaChaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar. 285-298 [doi]
- Automated Detection and Fingerprinting of Censorship Block PagesBen Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill. 299-304 [doi]
- Measuring Price Discrimination and Steering on E-commerce Web SitesAniko Hannak, Gary Soeller, David Lazer, Alan Mislove, Christo Wilson. 305-318 [doi]
- Capturing ghosts: predicting the used IPv4 space by inferring unobserved addressesSebastian Zander, Lachlan L. H. Andrew, Grenville J. Armitage. 319-332 [doi]
- A QoE Perspective on Sizing Network BuffersOliver Hohlfeld, Enric Pujol, Florin Ciucu, Anja Feldmann, Paul Barford. 333-346 [doi]
- Handcrafted Fraud and Extortion: Manual Account Hijacking in the WildElie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage. 347-358 [doi]
- Search + Seizure: The Effectiveness of Interventions on SEO CampaignsDavid Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker. 359-372 [doi]
- The Dark Alleys of Madison Avenue: Understanding Malicious AdvertisementsApostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, Giovanni Vigna. 373-380 [doi]
- Layer 1-informed Internet Topology MeasurementRamakrishnan Durairajan, Joel Sommers, Paul Barford. 381-394 [doi]
- WireCAP: a novel packet capture engine for commodity NICs in high-speed networksWenji Wu, Phil DeMar. 395-406 [doi]
- Timing is Everything: Accurate, Minimum Overhead, Available Bandwidth Estimation in High-speed Wired NetworksHan Wang, Ki-Suh Lee, Erluo Li, Chiunlin Lim, Ao Tang, Hakim Weatherspoon. 407-420 [doi]
- Identifying and Analyzing High Impact Routing Events with PathMinerGiovanni Comarela, Mark Crovella. 421-434 [doi]
- Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS AttacksJakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, Manish Karir. 435-448 [doi]
- DNSSEC and its potential for DDoS attacks: a comprehensive measurement studyRoland van Rijswijk-Deij, Anna Sperotto, Aiko Pras. 449-460 [doi]
- HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic AnalysisRobin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson. 461-474 [doi]
- The Matter of HeartbleedZakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson. 475-488 [doi]
- Analysis of SSL certificate reissues and revocations in the wake of heartbleedLiang Zhang, David R. Choffnes, Dave Levin, Tudor Dumitras, Alan Mislove, Aaron Schulman, Christo Wilson. 489-502 [doi]
- Forced Perspectives: Evaluating an SSL Trust Enhancement at ScaleAdam M. Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler. 503-510 [doi]