Abstract is missing.
- Impact of Device Performance on Mobile Internet QoEMallesham Dasari, Santiago Vargas, Arani Bhattacharya, Aruna Balasubramanian, Samir R. Das, Michael Ferdman. 1-7 [doi]
- When the Dike Breaks: Dissecting DNS Defenses During DDoSGiovane C. M. Moura, John S. Heidemann, Moritz Müller, Ricardo de Oliveira Schmidt, Marco Davids. 8-21 [doi]
- Three Bits Suffice: Explicit Support for Passive Measurement of Internet Latency in QUIC and TCPPiet De Vaere, Tobias Bühler, Mirja Kühlewind, Brian Trammell. 22-28 [doi]
- Multilevel MDA-Lite Paris TracerouteKevin Vermeulen, Stephen D. Strowes, Olivier Fourmaux, Timur Friedman. 29-42 [doi]
- Following Their Footsteps: Characterizing Account Automation Abuse and DefensesLouis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis. 43-55 [doi]
- Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet ScaleAlexander Marder, Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Jonathan M. Smith. 56-69 [doi]
- Digging into Browser-based Crypto MiningJan Rüth, Torsten Zimmermann, Konrad Wolsing, Oliver Hohlfeld. 70-76 [doi]
- A First Look at SIM-Enabled Wearables in the WildHarini Kolamunna, Ilias Leontiadis, Diego Perino, Suranga Seneviratne, Kanchana Thilakarathna, Aruna Seneviratne. 77-83 [doi]
- Comments on DNS RobustnessMark Allman. 84-90 [doi]
- Measuring Ethereum Network PeersSeoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael Bailey. 91-104 [doi]
- Is the Web Ready for OCSP Must-Staple?Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran 0002, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, John P. Rula, Nick Sullivan, Christo Wilson. 105-118 [doi]
- LDplayer: DNS Experimentation at ScaleLiang Zhu, John S. Heidemann. 119-132 [doi]
- Characterizing the Internet Host Population Using Deep Learning: A Universal and Lightweight Numerical EmbeddingArmin Sarabi, Mingyan Liu. 133-146 [doi]
- Mobility Support in Cellular Networks: A Measurement Study on Its Configurations and ImplicationsHaotian Deng, Chunyi Peng, Ans Fida, Jiayi Meng, Y. Charlie Hu. 147-160 [doi]
- Predictive Analysis in Network Function VirtualizationZhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, Laura Ogden. 161-167 [doi]
- Characterizing the Deployment and Performance of Multi-CDNsRachee Singh, Arun Dunna, Phillipa Gill. 168-174 [doi]
- Understanding Tor Usage with Privacy-Preserving MeasurementAkshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr. 175-187 [doi]
- On the Origins of Memes by Means of Fringe Web CommunitiesSavvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil. 188-202 [doi]
- How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active GeolocationZachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, Phillipa Gill. 203-217 [doi]
- 403 Forbidden: A Global View of CDN GeoblockingAllison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi. 218-230 [doi]
- Who Knocks at the IPv6 Door?: Detecting IPv6 ScanningKensuke Fukuda, John S. Heidemann. 231-237 [doi]
- Understanding Video Management PlanesZahaib Akhtar, Yun Seong Nam, Jessica Chen, Ramesh Govindan, Ethan Katz-Bassett, Sanjay G. Rao, Jibin Zhan, Hui Zhang. 238-251 [doi]
- Where The Light Gets In: Analyzing Web Censorship Mechanisms in IndiaTarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty. 252-264 [doi]
- O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPsGeorge Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos, Vasileios Giotsas. 265-278 [doi]
- BGP Communities: Even more Worms in the Routing CanFlorian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, Randy Bush. 279-292 [doi]
- Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App MarketsHaoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo 0001, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu. 293-307 [doi]
- In the IP of the Beholder: Strategies for Active IPv6 Topology DiscoveryRobert Beverly, Ramakrishnan Durairajan, David Plonka, Justin P. Rohrer. 308-321 [doi]
- From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the DropTobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda. 322-328 [doi]
- Tracing Cross Border Web TrackingCostas Iordanou, Georgios Smaragdakis, Ingmar Poese, Nikolaos Laoutaris. 329-342 [doi]
- The Rise of Certificate Transparency and Its Implications on the Internet EcosystemQuirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch. 343-349 [doi]
- Advancing the Art of Internet Edge Outage DetectionPhilipp Richter, Ramakrishna Padmanabhan, Neil Spring, Arthur W. Berger, David Clark. 350-363 [doi]
- Clusters in the Expanse: Understanding and Unbiasing IPv6 HitlistsOliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle. 364-378 [doi]
- An Empirical Study of the I2P Anonymity Network and its Censorship ResistanceNguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis. 379-392 [doi]
- A Large Scale Study of Data Center Network ReliabilityJustin Meza, Tianyin Xu, Kaushik Veeraraghavan, Onur Mutlu. 393-407 [doi]
- Dissecting Apple's Meta-CDN during an iOS UpdateJeremias Blendin, Fabrice Bendfeldt, Ingmar Poese, Boris Koldehofe, Oliver Hohlfeld. 408-414 [doi]
- Coming of Age: A Longitudinal Study of TLS DeploymentPlaton Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero. 415-428 [doi]
- Needle in a Haystack: Tracking Down Elite Phishing Domains in the WildKe Tian, Steve T. K. Jan, Hang Hu 0002, Danfeng Yao, Gang Wang 0011. 429-442 [doi]
- An Empirical Analysis of the Commercial VPN EcosystemMohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez. 443-456 [doi]
- A First Joint Look at DoS Attacks and BGP Blackholing in the WildMattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto. 457-463 [doi]
- Cloud Datacenter SDN Monitoring: Experiences and ChallengesArjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, Alex C. Snoeren. 464-470 [doi]
- How Tracking Companies Circumvented Ad Blockers Using WebSocketsMuhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson. 471-477 [doi]
- A Long Way to the Top: Significance, Structure, and Stability of Internet Top ListsQuirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez. 478-493 [doi]
- Analyzing Ethereum's Contract TopologyLucianna Kiffer, Dave Levin, Alan Mislove. 494-499 [doi]