Abstract is missing.
- Measurement and Analysis of Traffic Exchange ServicesMobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson. 1-12 [doi]
- Resilience of Deployed TCP to Blind AttacksMatthew J. Luckie, Robert Beverly, Tiange Wu, Mark Allman, kc claffy. 13-26 [doi]
- Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery SecurityZakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, J. Alex Halderman. 27-39 [doi]
- Affiliate Crookies: Characterizing Affiliate Marketing AbuseNeha Chachra, Stefan Savage, Geoffrey M. Voelker. 41-47 [doi]
- MPLS Under the Microscope: Revealing Actual Transit Path DiversityYves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet. 49-62 [doi]
- Is Explicit Congestion Notification usable with UDP?Stephen McQuistin, Colin S. Perkins. 63-69 [doi]
- Investigating Interdomain Routing Policies in the WildRuwaifa Anwar, Haseeb Niaz, David R. Choffnes, Ítalo S. Cunha, Phillipa Gill, Ethan Katz-Bassett. 71-77 [doi]
- Empirical Analysis of Search Advertising StrategiesBhanu Chandra Vattikonda, Vacha Dave, Saikat Guha, Alex C. Snoeren. 79-91 [doi]
- Annoyed Users: Ads and Ad-Block Usage in the WildEnric Pujol, Oliver Hohlfeld, Anja Feldmann. 93-106 [doi]
- Measuring the Impact and Perception of Acceptable AdvertisementsRobert J. Walls, Eric D. Kilmer, Nathaniel Lageman, Patrick Drew McDaniel. 107-120 [doi]
- Location, Location, Location: The Impact of Geolocation on Web Search PersonalizationChloe Kliman-Silver, Aniko Hannak, David Lazer, Christo Wilson, Alan Mislove. 121-127 [doi]
- Reliable Recon in Adversarial Peer-to-Peer BotnetsDennis Andriesse, Christian Rossow, Herbert Bos. 129-140 [doi]
- The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social NetworksOana Goga, Giridhari Venkatadri, Krishna P. Gummadi. 141-153 [doi]
- Dissecting UbuntuOne: Autopsy of a Global-scale Personal Cloud Back-endRaúl Gracia Tinedo, YongChao Tian, Josep Sampé, Hamza Harkous, John Lenton, Pedro García López, Marc Sánchez Artigas, Marko Vukolic. 155-168 [doi]
- The Dark Menace: Characterizing Network-based Attacks in the CloudRui Miao, Rahul Potharaju, Minlan Yu, Navendu Jain. 169-182 [doi]
- An End-to-End Measurement of Certificate Revocation in the Web's PKIYabing Liu, Will Tome, Liang Zhang, David R. Choffnes, Dave Levin, Bruce Maggs, Alan Mislove, Aaron Schulman, Christo Wilson. 183-196 [doi]
- Detecting Malicious Activity with DNS BackscatterKensuke Fukuda, John Heidemann. 197-210 [doi]
- Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine LearningDapeng Liu, Youjian Zhao, Haowen Xu, Yongqian Sun, Dan Pei, Jiao Luo, Xiaowei Jing, Mei Feng. 211-224 [doi]
- Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban EnvironmentHuandong Wang, Fengli Xu, Yong Li, Pengyu Zhang, Depeng Jin. 225-238 [doi]
- Identifying Traffic Differentiation in Mobile NetworksArash Molavi Kakhki, Abbas Razaghpanah, Anke Li, Hyungjoon Koo, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove. 239-251 [doi]
- Tracking the Evolution and Diversity in Network Usage of SmartphonesKensuke Fukuda, Hirochika Asai, Kenichi Nagami. 253-266 [doi]
- Opportunities and Challenges in Crowdsourced WardrivingPiotr Sapiezynski, Radu Gatej, Alan Mislove, Sune Lehmann. 267-273 [doi]
- MoonGen: A Scriptable High-Speed Packet GeneratorPaul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, Georg Carle. 275-287 [doi]
- Ting: Measuring and Exploiting Latencies Between All Tor NodesFrank Cangialosi, Dave Levin, Neil Spring. 289-302 [doi]
- Timeouts: Beware Surprisingly High DelayRamakrishna Padmanabhan, Patrick Owen, Aaron Schulman, Neil Spring. 303-316 [doi]
- Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and ThroughputXueheng Hu, Lixing Song, Dirk Van Bruggen, Aaron Striegel. 317-323 [doi]
- Electri-Fi Your Data: Measuring and Combining Power-Line Communications with WiFiChristina Vlachou, Sébastien Henri, Patrick Thiran. 325-338 [doi]
- Revisiting Network Energy Efficiency of Mobile Apps: Performance in the WildSanae Rosen, Ashkan Nikravesh, Yihua Guo, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen. 339-345 [doi]
- StreetSense: Effect of Bus Wi-Fi APs on Pedestrian SmartphoneSehyun Bae, Daehyun Ban, Dahyeon Han, Jiyoung Kim, Kyu-haeng Lee, SangSoon Lim, Woojin Park, Chong-kwon Kim. 347-353 [doi]
- Going Wild: Large-Scale Classification of Open DNS ResolversMarc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz. 355-368 [doi]
- Who is .com?: Learning to Parse WHOIS RecordsSuqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul. 369-380 [doi]
- From .academy to .zone: An Analysis of the New TLD Land RushTristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker. 381-394 [doi]
- Management Plane AnalyticsAaron Gember-Jacobson, Wenfei Wu, Xiujun Li, Aditya Akella, Ratul Mahajan. 395-408 [doi]
- PerfSight: Performance Diagnosis for Software DataplanesWenfei Wu, Keqiang He, Aditya Akella. 409-421 [doi]
- Leveraging Internet Background Radiation for Opportunistic Network AnalysisKaryn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, Michael Kallitsis. 423-436 [doi]
- Quantifying Interference between Measurements on the RIPE Atlas PlatformThomas Holterbach, Cristel Pelsser, Randy Bush, Laurent Vanbever. 437-443 [doi]
- Examining How the Great Firewall Discovers Hidden Circumvention ServersRoya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson. 445-458 [doi]
- Characterizing Smartphone Usage Patterns from Millions of Android UsersHuoran Li, Xuan Lu, Xuanzhe Liu, Tao Xie, Kaigui Bian, Felix Xiaozhu Lin, Qiaozhu Mei, Feng Feng. 459-472 [doi]
- Offline Downloading in China: A Comparative StudyZhenhua Li, Christo Wilson, Tianyin Xu, Yao Liu, Zhen Lu, Yinlong Wang. 473-486 [doi]
- In and Out of Cuba: Characterizing Cuba's ConnectivityZachary S. Bischof, John P. Rula, Fabián E. Bustamante. 487-493 [doi]
- Peeking Beneath the Hood of UberLe Chen, Alan Mislove, Christo Wilson. 495-508 [doi]
- Temporal and Spatial Classification of Active IPv6 AddressesDavid Plonka, Arthur Berger. 509-522 [doi]
- Are We One Hop Away from a Better Internet?Yi-Ching Chiu, Brandon Schlinker, Abhishek Balaji Radhakrishnan, Ethan Katz-Bassett, Ramesh Govindan. 523-529 [doi]
- Analyzing the Performance of an Anycast CDNMatt Calder, Ashley Flavel, Ethan Katz-Bassett, Ratul Mahajan, Jitendra Padhye. 531-537 [doi]