Abstract is missing.
- Inferring BGP blackholing activity in the internetVasileios Giotsas, Philipp Richter, Georgios Smaragdakis, Anja Feldmann, Christoph Dietzel, Arthur W. Berger. 1-14 [doi]
- Pinpointing delay and forwarding anomalies using large-scale traceroute measurementsRomain Fontugne, Cristel Pelsser, Emile Aben, Randy Bush. 15-28 [doi]
- Through the wormhole: tracking invisible MPLS tunnelsYves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet. 29-42 [doi]
- Challenges in inferring internet congestion using throughput measurementsSrikanth Sundaresan, Xiaohong Deng, Yun-feng, Danny Lee, Amogh Dhamdhere. 43-56 [doi]
- Investigating the causes of congestion on the african IXP substrateRodérick Fanou, Francisco Valera, Amogh Dhamdhere. 57-63 [doi]
- TCP congestion signaturesSrikanth Sundaresan, Mark Allman, Amogh Dhamdhere, kc claffy. 64-77 [doi]
- High-resolution measurement of data center microburstsQiao Zhang, Vincent Liu, Hongyi Zeng, Arvind Krishnamurthy. 78-85 [doi]
- Detection, classification, and analysis of inter-domain traffic with spoofed source IP addressesFranziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter, Anja Feldmann. 86-99 [doi]
- Millions of targets under attack: a macroscopic characterization of the DoS ecosystemMattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti. 100-113 [doi]
- Your state is not mine: a closer look at evading stateful internet censorshipZhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy. 114-127 [doi]
- lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficientlyFangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David R. Choffnes, Phillipa Gill, Alan Mislove. 128-141 [doi]
- If you are not paying for it, you are the product: how much do advertisers pay to reach you?Panagiotis Papadopoulos, Pablo Rodríguez Rodríguez, Nicolas Kourtellis, Nikolaos Laoutaris. 142-156 [doi]
- Exploring the dynamics of search advertiser fraudJoe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren. 157-170 [doi]
- The ad wars: retrospective measurement and analysis of anti-adblock filter listsUmar Iqbal, Zubair Shafiq, Zhiyun Qian. 171-183 [doi]
- On the structure and characteristics of user agent stringJeffery Kline, Paul Barford, Aaron Cahn, Joel Sommers. 184-190 [doi]
- Cell spotting: studying the role of cellular networks in the internetJohn P. Rula, Fabián E. Bustamante, Moritz Steiner. 191-204 [doi]
- Measurement-based, practical techniques to improve 802.11ac performanceApurv Bhartia, Bo Chen, Feng Wang, Derrick Pallas, Raluca Musaloiu-E, Ted Tsung-Te Lai, Hao Ma. 205-219 [doi]
- Dissecting VOD services for cellular: performance, root causes and best practicesShichang Xu, Subhabrata Sen, Zhuoqing Morley Mao, Yunhan Jia. 220-234 [doi]
- Connected cars in cellular network: a measurement studyCarlos E. Andrade, Simon D. Byers, Vijay Gopalakrishnan, Emir Halepovic, David J. Poole, Lien K. Tran, Christopher T. Volinsky. 235-241 [doi]
- Target generation for internet-wide IPv6 scanningAustin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, Vern Paxson. 242-253 [doi]
- Packetlab: a universal measurement endpoint interfaceKirill Levchenko, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Mark Allman, Vern Paxson. 254-260 [doi]
- Automatic metadata generation for active measurementJoel Sommers, Ramakrishnan Durairajan, Paul Barford. 261-267 [doi]
- A high-performance algorithm for identifying frequent items in data streamsDaniel Anderson, Pryce Bevan, Kevin J. Lang, Edo Liberty, Lee Rhodes, Justin Thaler. 268-282 [doi]
- Recursive lattice search: hierarchical heavy hitters revisitedKenjiro Cho. 283-289 [doi]
- Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocolsArash Molavi Kakhki, Samuel Jero, David Choffnes, Cristina Nita-Rotaru, Alan Mislove. 290-303 [doi]
- Large-scale scanning of TCP's initial windowJan Rüth, Christian Bormann, Oliver Hohlfeld. 304-310 [doi]
- The record route option is an option!Brian J. Goodchild, Yi-Ching Chiu, Rob Hansen, Haonan Lua, Matt Calder, Matthew J. Luckie, Wyatt Lloyd, David Choffnes, Ethan Katz-Bassett. 311-317 [doi]
- Initial measurements of the cuban street networkEduardo E. P. Pujol, Will Scott, Eric Wustrow, J. Alex Halderman. 318-324 [doi]
- Mission accomplished?: HTTPS security after diginotarJohanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, Ralph Holz. 325-340 [doi]
- Tripwire: inferring internet site compromiseJoe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren. 341-354 [doi]
- Measuring and mitigating oauth access token abuse by collusion networksShehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq. 355-368 [doi]
- Understanding the role of registrars in DNSSEC deploymentTaejoong Chung, Roland van Rijswijk-Deij, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson. 369-383 [doi]
- Complexity vs. performance: empirical analysis of machine learning as a serviceYuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao. 384-397 [doi]
- An empirical characterization of IFTTT: ecosystem, usage, and performanceXianghang Mi, Feng Qian, Ying Zhang, Xiaofeng Wang. 398-404 [doi]
- The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sourcesSavvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn. 405-417 [doi]
- Email typosquattingJanos Szurdi, Nicolas Christin. 419-431 [doi]
- Fifteen minutes of unwanted fame: detecting and characterizing doxingPeter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy. 432-444 [doi]
- Ethical issues in research using datasets of illicit originDaniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R. Beresford. 445-462 [doi]
- A look at router geolocation in public and commercial databasesManaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, Christos Papadopoulos. 463-469 [doi]
- Shortcuts through colocation facilitiesVasileios Kotronis, George Nomikos, Lefteris Manassakis, Dimitris Mavrommatis, Xenofontas A. Dimitropoulos. 470-476 [doi]
- Broad and load-aware anycast mapping with verfploeterWouter B. de Vries, Ricardo de Oliveira Schmidt, Wes Hardaker, John S. Heidemann, Pieter-Tjerk de Boer, Aiko Pras. 477-488 [doi]
- Recursives in the wild: engineering authoritative DNS serversMoritz Müller, Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann. 489-495 [doi]