Abstract is missing.
- Network Growth and Link Prediction Through an Empirical LensQingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng. 1-15 [doi]
- "Recommended For You": A First Look at Content Recommendation NetworksMuhammad Ahmad Bashir, Sajjad Arshad, Christo Wilson. 17-24 [doi]
- You Can Yak but You Can't Hide: Localizing Anonymous Social Network UsersMinhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian. 25-31 [doi]
- Measuring the Security Harm of TLS Crypto ShortcutsDrew Springall, Zakir Durumeric, J. Alex Halderman. 33-47 [doi]
- Weak Keys Remain Widespread in Network DevicesMarcella Hastings, Joshua Fried, Nadia Heninger. 49-63 [doi]
- What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the WildJeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini. 65-79 [doi]
- Condensing Steam: Distilling the Diversity of Gamer BehaviorMark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala. 81-95 [doi]
- Browser Feature Usage on the Modern WebPeter Snyder, Lara Ansari, Cynthia Taylor, Chris Kanich. 97-110 [doi]
- Characterizing Website Behaviors Across Logged-in and Not-logged-in UsersAndrew J. Kaizer, Minaxi Gupta. 111-117 [doi]
- Ad Blockers: Global Prevalence and ImpactMatthew Malloy, Mark McNamara, Aaron Cahn, Paul Barford. 119-125 [doi]
- On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics ServiceRijurekha Sen, Hasnain Ali Pirzada, Amreesh Phokeer, Zaid Ahmed Farooq, Satadal Sengupta, David R. Choffnes, Krishna P. Gummadi. 127-133 [doi]
- Beyond Counting: New Perspectives on the Active IPv4 Address SpacePhilipp Richter, Georgios Smaragdakis, David Plonka, Arthur W. Berger. 135-149 [doi]
- Identifying and Aggregating Homogeneous IPv4 /24 Blocks with HobbitYoundo Lee, Neil Spring. 151-165 [doi]
- Entropy/IP: Uncovering Structure in IPv6 AddressesPawel Foremski, David Plonka, Arthur W. Berger. 167-181 [doi]
- Reasons Dynamic Addresses ChangeRamakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, kc claffy, Neil Spring. 183-198 [doi]
- Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the InternetTaejoong Chung, David R. Choffnes, Alan Mislove. 199-213 [doi]
- A Multi-perspective Analysis of Carrier-Grade NAT DeploymentPhilipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson. 215-229 [doi]
- Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP PortsShane Alcock, Jean-Pierre Möller, Richard Nelson. 231-237 [doi]
- Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification RulesFangfan Li, Arash Molavi Kakhki, David R. Choffnes, Phillipa Gill, Alan Mislove. 239-245 [doi]
- WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-RegistrationTobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda. 247-253 [doi]
- Anycast vs. DDoS: Evaluating the November 2015 Root DNS EventGiovane C. M. Moura, Ricardo de Oliveira Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman. 255-270 [doi]
- Zone Poisoning: The How and Where of Non-Secure DNS Dynamic UpdatesMaciej Korczynski, Michal Król, Michel van Eeten. 271-278 [doi]
- Measuring the Adoption of DDoS Protection ServicesMattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras. 279-285 [doi]
- An Empirical Analysis of a Large-scale Mobile Cloud Storage ServiceZhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste. 287-301 [doi]
- Understanding On-device Bufferbloat for Cellular UploadYihua Guo, Feng Qian, Qi Alfred Chen, Zhuoqing Morley Mao, Subhabrata Sen. 303-317 [doi]
- A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing WorldSohaib Ahmad, Abdul Lateef Haamid, Zafar Ayyub Qazi, Zhenyu Zhou, Theophilus Benson, Ihsan Ayyub Qazi. 319-325 [doi]
- Time to Measure the PiPeter Membrey, Darryl Veitch, Rocky K. C. Chang. 327-334 [doi]
- MNTP: Enhancing Time Synchronization for Mobile DevicesSathiya Kumaran Mani, Ramakrishnan Durairajan, Paul Barford, Joel Sommers. 335-348 [doi]
- An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled AppsMuhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaâfar, Vern Paxson. 349-364 [doi]
- Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online ServicesChristophe Leung, Jingjing Ren, David R. Choffnes, Christo Wilson. 365-372 [doi]
- User Profiling in the Time of HTTPSRoberto Gonzalez, Claudio Soriente, Nikolaos Laoutaris. 373-379 [doi]
- bdrmap: Inference of Borders Between IP NetworksMatthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, David D. Clark, kc claffy. 381-396 [doi]
- MAP-IT: Multipass Accurate Passive Inferences from TracerouteAlexander Marder, Jonathan M. Smith. 397-411 [doi]
- Yarrp'ing the Internet: Randomized High-Speed Active Topology DiscoveryRobert Beverly. 413-420 [doi]
- Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix SelectionJohannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth 0002. 421-427 [doi]
- BGPStream: A Software Framework for Live and Historical BGP Data AnalysisChiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti. 429-444 [doi]
- Detecting Unusually-Routed ASes: Methods and ApplicationsGiovanni Comarela, Evimaria Terzi, Mark Crovella. 445-459 [doi]
- Optical Layer Failures in a Large BackboneMonia Ghobadi, Ratul Mahajan. 461-467 [doi]
- BGP Prefix Delegations: A Deep DiveThomas Krenc, Anja Feldmann. 469-475 [doi]
- A First Look at Quality of Mobile Live Streaming Experience: the Case of PeriscopeMatti Siekkinen, Enrico Masala, Teemu Kämäräinen. 477-483 [doi]
- Anatomy of a Personalized Livestreaming SystemBolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao. 485-498 [doi]
- Performance Characterization of a Commercial Video Streaming ServiceMojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford. 499-511 [doi]
- Measuring Video QoE from Encrypted TrafficGiorgos Dimopoulos, Ilias Leontiadis, Pere Barlet-Ros, Konstantina Papagiannaki. 513-526 [doi]
- Measuring and Applying Invalid SSL Certificates: The Silent MajorityTaejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson. 527-541 [doi]
- Towards a Complete View of the Certificate EcosystemBenjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael Bailey, J. Alex Halderman. 543-549 [doi]
- TLS Proxies: Friend or Foe?Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala. 551-557 [doi]