Abstract is missing.
- The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet TrafficAnja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis. 1-18 [doi]
- A Characterization of the COVID-19 Pandemic Impact on a Mobile Network Operator TrafficAndra Lutu, Diego Perino, Marcelo Bagnulo, Enrique Frías-Martínez, Javad Khangosstar. 19-33 [doi]
- How the Internet reacted to Covid-19: A perspective from Facebook's Edge NetworkTimm Böttger, Ghida Ibrahim, Ben Vallis. 34-41 [doi]
- Clouding up the Internet: how centralized is DNS traffic becoming?Giovane C. M. Moura, Sebastian Castro, Wes Hardaker, Maarten Wullink, Cristian Hesselman. 42-49 [doi]
- Trufflehunter: Cache Snooping Rare Domains at Large Public DNS ResolversAudrey Randall, Enze Liu, Gautam Akiwate, Ramakrishna Padmanabhan, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman. 50-64 [doi]
- Behind Closed Doors: A Network Tale of Spoofing, Intrusion, and False DNS SecurityCasey Deccio, Alden Hilton, Michael Briggs, Trevin Avery, Robert Richardson. 65-77 [doi]
- Are You Human?: Resilience of Phishing Detection to Evasion Techniques Based on Human VerificationSourena Maroofi, Maciej Korczynski, Andrzej Duda. 78-86 [doi]
- A Haystack Full of Needles: Scalable Detection of IoT Devices in the WildSaid Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David R. Choffnes, Georgios Smaragdakis, Anja Feldmann. 87-100 [doi]
- Easing the Conscience with OPC UA: An Internet-Wide Study on Insecure DeploymentsMarkus Dahlmanns, Johannes Lohmöller, Ina Berenice Fink, Jan Pennekamp, Klaus Wehrle, Martin Henze. 101-110 [doi]
- How China Detects and Blocks ShadowsocksAlice, Bob, Carol, Jan Beznazwy, Amir Houmansadr. 111-124 [doi]
- Investigating Large Scale HTTPS Interception in KazakhstanRam Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi. 125-132 [doi]
- Reading In-Between the Lines: An Analysis of DissenterErik C. Rye, Jeremy Blackburn, Robert Beverly. 133-146 [doi]
- Where Things Roam: Uncovering Cellular IoT/M2M ConnectivityAndra Lutu, Byungjin Jun, Alessandro Finamore, Fabián E. Bustamante, Diego Perino. 147-161 [doi]
- Five Alarms: Assessing the Vulnerability of US Cellular Communication Infrastructure to WildfiresScott Anderson, Carol Barford, Paul Barford. 162-175 [doi]
- Lumos5G: Mapping and Predicting Commercial mmWave 5G ThroughputArvind Narayanan, Eman Ramadan, Rishabh Mehta, Xinyue Hu, Qingxu Liu, Rostand A. K. Fezeu, Udhaya Kumar Dayalan, Saurabh Verma, Peiqi Ji, Tao Li, Feng Qian, Zhi-Li Zhang. 176-193 [doi]
- Out of Sight, Not Out of Mind: A User-View on the Criticality of the Submarine Cable NetworkShucheng Liu, Zachary S. Bischof, Ishaan Madan, Peter K. Chan, Fabián E. Bustamante. 194-200 [doi]
- Uncharted Networks: A First Measurement Study of the Bulk Power SystemKelvin Mai, Xi Qin, Neil Ortiz Silva, Jason Molina, Alvaro A. Cárdenas. 201-213 [doi]
- Exploring the "Internet from space" with HypatiaSimon Kassing, Debopam Bhattacherjee, André Baptista Águas, Jens Eirik Saethre, Ankit Singla. 214-229 [doi]
- Cloud Provider Connectivity in the Flat InternetTodd Arnold, Jia He, Weifan Jiang, Matt Calder, Ítalo Cunha, Vasileios Giotsas, Ethan Katz-Bassett. 230-246 [doi]
- Reduce, Reuse, Recycle: Repurposing Existing Measurements to Identify Stale TraceroutesVasileios Giotsas, Thomas Koch, Elverton C. Fazzion, Ítalo Cunha, Matt Calder, Harsha V. Madhyastha, Ethan Katz-Bassett. 247-265 [doi]
- TopoScope: Recover AS Relationships From Fragmentary ObservationsZitong Jin, Xingang Shi, Yan Yang, Xia Yin, Zhiliang Wang, Jianping Wu. 266-280 [doi]
- Unresolved Issues: Prevalence, Persistence, and Perils of Lame DelegationsGautam Akiwate, Mattijs Jonker, Raffaele Sommese, Ian D. Foster, Geoffrey M. Voelker, Stefan Savage, kc claffy. 281-294 [doi]
- The Reality of Algorithm Agility: Studying the DNSSEC Algorithm Life-CycleMoritz Müller, Willem Toorop, Taejoong Chung, Jelte Jansen, Roland van Rijswijk-Deij. 295-308 [doi]
- Putting DNS in ContextMark Allman. 309-316 [doi]
- Measuring the Emergence of Consent Management on the WebMaximilian Hils, Daniel W. Woods, Rainer Böhme. 317-332 [doi]
- On the Potential for Discrimination via CompositionGiridhari Venkatadri, Alan Mislove. 333-344 [doi]
- Demystifying the Messaging Platforms' Ecosystem Through the Lens of TwitterMohamad Hoseini, Philipe F. Melo, Manoel Junior, Fabrício Benevenuto, Balakrishnan Chandrasekaran 0002, Anja Feldmann, Savvas Zannettou. 345-359 [doi]
- Quantifying the Impact of Blocklisting in the Age of Address ReuseSivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz. 360-369 [doi]
- Who Touched My Browser Fingerprint?: A Large-scale Measurement Study and Classification of Fingerprint DynamicsSong Li, Yinzhi Cao. 370-385 [doi]
- Learning to Extract and Use ASNs in HostnamesMatthew Luckie, Alexander Marder, Marianne Fletcher, Bradley Huffaker, kc claffy. 386-392 [doi]
- No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPsDavid Major, Ross Teixeira, Jonathan Mayer. 393-419 [doi]
- Persistent Last-mile Congestion: Not so UncommonRomain Fontugne, Anant Shah, Kenjiro Cho. 420-427 [doi]
- Towards A User-Level Understanding of IPv6 BehaviorFrank Li 0001, David Freeman. 428-442 [doi]
- FlashRoute: Efficient Traceroute on a Massive ScaleYuchen Huang, Michael Rabinovich, Rami Al-Dalky. 443-455 [doi]
- MAnycast2: Using Anycast to Measure AnycastRaffaele Sommese, Leandro Marcio Bertholdo, Gautam Akiwate, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, kc claffy, Anna Sperotto. 456-463 [doi]
- Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open QuestionsZinan Lin 0001, Alankar Jain, Chen Wang, Giulia C. Fanti, Vyas Sekar. 464-483 [doi]
- On Measuring RPKI Relying PartiesJohn Kristoff, Randy Bush, Chris Kanich, George Michaelson, Amreesh Phokeer, Thomas C. Schmidt, Matthias Wählisch. 484-491 [doi]
- BGP Beacons, Network Tomography, and Bayesian Computation to Locate Route Flap DampingCaitlin Gray, Clemens Mosig, Randy Bush, Cristel Pelsser, Matthew Roughan, Thomas C. Schmidt, Matthias Wählisch. 492-505 [doi]
- AS-Path Prepending: there is no rose without a thornPedro de B. Marcos, Lars Prehn, Lucas Leal, Alberto Dainotti, Anja Feldmann, Marinho P. Barcellos. 506-520 [doi]
- A Bird's Eye View of the World's Fastest NetworksDebopam Bhattacherjee, Waqar Aqeel, Gregory Laughlin, Bruce M. Maggs, Ankit Singla. 521-527 [doi]
- Dissecting the Communication Latency in Distributed Deep Sparse LearningHeng Pan, Zhenyu Li 0001, Jianbo Dong, Zheng Cao, Tao Lan, Di Zhang, Gareth Tyson, Gaogang Xie. 528-534 [doi]
- Revisiting Transactional Statistics of High-scalability BlockchainsDaniel Pérez 0002, Jiahua Xu, Benjamin Livshits. 535-550 [doi]
- Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 ErasAnh V. Vu, Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, Alice Hutchings. 551-566 [doi]
- Who is targeted by email-based phishing and malware?: Measuring factors that differentiate riskCamelia Simoiu, Ali Zand, Kurt Thomas, Elie Bursztein. 567-576 [doi]
- Accept the Risk and Continue: Measuring the Long Tail of Government https AdoptionSudheesh Singanamalla, Esther Han Beol Jang, Richard J. Anderson, Tadayoshi Kohno, Kurtis Heimerl. 577-597 [doi]
- Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification ServicesPelayo Vallina, Victor Le Pochat, Álvaro Feal, Marius Paraschiv, Julien Gamba, Tim Burke, Oliver Hohlfeld, Juan Tapiador, Narseo Vallina-Rodriguez. 598-618 [doi]
- Identifying Sensitive URLs atWeb-ScaleSrdjan Matic, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris. 619-633 [doi]
- Analyzing Third Party Service Dependencies in Modern Web Services: Have We Learned from the Mirai-Dyn Incident?Aqsa Kashaf, Vyas Sekar, Yuvraj Agarwal. 634-647 [doi]
- Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API UsageShaown Sarker, Jordan Jueckstock, Alexandros Kapravelos. 648-661 [doi]
- On the Origin of Scanning: The Impact of Location on Internet-Wide ScansGerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, Zakir Durumeric. 662-679 [doi]
- On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance MeasurementWaqar Aqeel, Balakrishnan Chandrasekaran 0002, Anja Feldmann, Bruce M. Maggs. 680-695 [doi]
- Understanding Incentivized Mobile App Installs on Google Play StoreShehroze Farooqi, Álvaro Feal, Tobias Lauinger, Damon McCoy, Zubair Shafiq, Narseo Vallina-Rodriguez. 696-709 [doi]
- Who's left behind?: Measuring Adoption of Application Updates at ScaleJohn P. Rula, Philipp Richter, Georgios Smaragdakis, Arthur W. Berger. 710-723 [doi]
- When Push Comes to Ads: Measuring the Rise of (Malicious) Push AdvertisingKarthika Subramani, Xingzi Yuan, Omid Setayeshfar, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci. 724-737 [doi]