Abstract is missing.
- Examination of WAN traffic characteristics in a large-scale data center networkZhaohua Wang, Zhenyu Li 0001, Guangming Liu, Yunfei Chen, Qinghua Wu, Gang Cheng. 1-14 [doi]
- AutoSens: inferring latency sensitivity of user activity through natural experimentsParth Thakkar, Rohan Saxena, Venkata N. Padmanabhan. 15-21 [doi]
- Federated infrastructure: usage, patterns, and insights from "the people's network"Dhananjay Jagtap, Alex Yen, Huanlei Wu, Aaron Schulman, Pat Pannuto. 22-36 [doi]
- From cloud to edge: a first look at public edge platformsMengwei Xu, Zhe Fu, Xiao Ma, Li Zhang, Yanan Li, Feng Qian, Shangguang Wang, Ke Li, Jingyu Yang, Xuanzhe Liu. 37-53 [doi]
- Measuring the network performance of Google cloud platformRicky K. P. Mok, Hongyu Zou, Rui Yang, Tom Koch, Ethan Katz-Bassett, Kimberly C. Claffy. 54-61 [doi]
- Cloudy with a chance of short RTTs: analyzing cloud connectivity in the internetThe Khang Dang, Nitinder Mohan, Lorenzo Corneo, Aleksandr Zavodovski, Jörg Ott, Jussi Kangasharju. 62-79 [doi]
- Unbiased experiments in congested networksBruce Spang, Veronica Hannan, Shravya Kunamalla, Te-Yuan Huang, Nick McKeown, Ramesh Johari. 80-95 [doi]
- Revisiting TCP congestion control throughput models & fairness properties at scaleAdithya Abraham Philip, Ranysha Ware, Rukshani Athapathu, Justine Sherry, Vyas Sekar. 96-103 [doi]
- Precise error estimation for sketch-based flow measurementPeiqing Chen, Yuhan Wu, Tong Yang 0003, Junchen Jiang, Zaoxing Liu. 113-121 [doi]
- Who's got your mail?: characterizing mail service provider usageEnze Liu 0001, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Stefan Savage, Geoffrey M. Voelker. 122-136 [doi]
- Characterising the IETF through the lens of RFC deploymentStephen McQuistin, Mladen Karan, Prashant Khare, Colin Perkins, Gareth Tyson, Matthew Purver, Patrick Healey, Waleed Iqbal, Junaid Qadir 0001, Ignacio Castro. 137-149 [doi]
- Third time's not a charm: exploiting SNMPv3 for router fingerprintingTaha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis. 150-164 [doi]
- IoTLS: understanding TLS usage in consumer IoT devicesMuhammad Talha Paracha, Daniel J. Dubois, Narseo Vallina-Rodriguez, David R. Choffnes. 165-178 [doi]
- Tracing your roots: exploring the TLS trust anchor ecosystemZane Ma, James Austgen, Joshua Mason, Zakir Durumeric, Michael Bailey. 179-194 [doi]
- Open for hire: attack trends and misconfiguration pitfalls of IoT devicesShreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. 195-215 [doi]
- Can you see me now?: a measurement study of Zoom, Webex, and MeetHyunseok Chang, Matteo Varvello, Fang Hao, Sarit Mukherjee. 216-228 [doi]
- Measuring the performance and network utilization of popular video conferencing applicationsKyle MacMillan, Tarun Mangla, James Saxon, Nick Feamster. 229-244 [doi]
- The shape of view: an alert system for video viewership anomaliesAntonis Manousis, Harshil Shah, Henry Milner, Yan Li, Hui Zhang 0001, Vyas Sekar. 245-260 [doi]
- It's over 9000: analyzing early QUIC deployments with the standardization on the horizonJohannes Zirngibl, Philippe Buschmann, Patrick Sattler, Benedikt Jaeger, Juliane Aulbach, Georg Carle. 261-275 [doi]
- Web censorship measurements of HTTP/3 over QUICKathrin Elmenhorst, Bertram Schütz, Nils Aschenbruck, Simone Basso. 276-282 [doi]
- QUICsand: quantifying QUIC reconnaissance scans and DoS flooding eventsMarcin Nawrocki, Raphael Hiesgen, Thomas C. Schmidt, Matthias Wählisch. 283-291 [doi]
- Sharding and HTTP/2 connection reuse revisited: why are there still redundant connections?Constantin Sander, Leo Blöcher, Klaus Wehrle, Jan Rüth. 292-301 [doi]
- TopoShot: uncovering Ethereum's network topology leveraging replacement transactionsKai Li, Yuzhe Tang, Jiaqi Chen, Yibo Wang, Xianghong Liu. 302-319 [doi]
- Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutralityJohnnatan Messias, Mohamed Alzayat, Balakrishnan Chandrasekaran 0002, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove. 320-335 [doi]
- An empirical study of DeFi liquidations: incentives, risks, and instabilitiesKaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, Arthur Gervais. 336-350 [doi]
- Measuring DNS-over-HTTPS performance around the worldRishabh Chhabra, Paul Murley, Deepak Kumar 0006, Michael Bailey, Gang Wang. 351-365 [doi]
- TRAGEN: a synthetic trace generator for realistic cache simulationsAnirudh Sabnis, Ramesh K. Sitaraman. 366-379 [doi]
- HLISA: towards a more reliable measurement toolDaniel Goßen, Hugo Jonker, Stefan Karsch, Benjamin Krumnow, David Roefs. 380-389 [doi]
- Home is where the hijacking is: understanding DNS interception by residential routersAudrey Randall, Enze Liu 0001, Ramakrishna Padmanabhan, Gautam Akiwate, Geoffrey M. Voelker, Stefan Savage, Aaron Schulman. 390-397 [doi]
- TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNSGiovane C. M. Moura, Sebastian Castro, John S. Heidemann, Wes Hardaker. 398-418 [doi]
- The far side of DNS amplification: tracing the DDoS attack ecosystem from the internet coreMarcin Nawrocki, Mattijs Jonker, Thomas C. Schmidt, Matthias Wählisch. 419-434 [doi]
- Throttling Twitter: an emerging censorship technique in RussiaDiwen Xue, Reethika Ramesh, Valdik S. S, Leonid Evdokimov, Andrey Viktorov, Arham Jain, Eric Wustrow, Simone Basso, Roya Ensafi. 435-443 [doi]
- Understanding engagement with U.S. (mis)information news sources on FacebookLaura Edelson, Minh-Kha Nguyen, Ian Goldstein, Oana Goga, Damon McCoy, Tobias Lauinger. 444-463 [doi]
- Unique on Facebook: formulation and evidence of (nano)targeting individual users with non-PII dataJosé González Cabañas, Ángel Cuevas, Rubén Cuevas, Juan López-Fernández, David García 0001. 464-479 [doi]
- Locked-in during lock-down: undergraduate life on the internet in a pandemicAlisha Ukani, Ariana Mirian, Alex C. Snoeren. 480-486 [doi]
- Networked systems as witnesses: association between content demand, human mobility and an infection spreadSana Asif, Byungjin Jun, Fabián E. Bustamante, John P. Rula. 487-506 [doi]
- Polls, clickbait, and commemorative $2 bills: problematic political advertising on news and media websites around the 2020 U.S. electionsEric Zeng, Miranda Wei, Theo Gregersen, Tadayoshi Kohno, Franziska Roesner. 507-525 [doi]
- Who you gonna call?: an empirical evaluation of website security.txt deploymentTara Poteat, Frank Li. 526-532 [doi]
- Understanding the performance of webassembly applicationsYutian Yan, Tengfei Tu, Lijian Zhao, Yuchen Zhou, Weihang Wang 0001. 533-549 [doi]
- Knock and talk: investigating local network communications on websitesDhruv Kuchhal, Frank Li. 550-568 [doi]
- TrackerSift: untangling mixed tracking and functional web resourcesAbdul Haddi Amjad, Danial Saleem, Muhammad Ali Gulzar, Zubair Shafiq, Fareed Zaffar. 569-576 [doi]
- AS-level BGP community usage classificationThomas Krenc, Robert Beverly, Georgios Smaragdakis. 577-592 [doi]
- The parallel lives of autonomous systems: ASN allocations vs. BGPEugenio Nerio Nemmi, Francesco Sassi, Massimo La Morgia, Cecilia Testart, Alessandro Mei, Alberto Dainotti. 593-611 [doi]
- How biased is our validation (data) for AS relationships?Lars Prehn, Anja Feldmann. 612-620 [doi]
- A large-scale characterization of online incitements to harassment across platformsMaxwell Aliapoulios, Kejsi Take, Prashanth Ramakrishna, Daniel Borkan, Beth Goldberg, Jeffrey Sorensen, Anna Turner, Rachel Greenstadt, Tobias Lauinger, Damon McCoy. 621-638 [doi]
- RacketStore: measurements of ASO deception in Google play via mobile and app usageNestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishtiaque Ahmed. 639-657 [doi]
- Smart at what cost?: characterising mobile deep neural networks in the wildMário Almeida, Stefanos Laskaridis, Abhinav Mehrotra, Lukasz Dudziak, Ilias Leontiadis, Nicholas D. Lane. 658-672 [doi]
- Risky BIZness: risks derived from registrar name managementGautam Akiwate, Stefan Savage, Geoffrey M. Voelker, Kimberly C. Claffy. 673-686 [doi]
- Identifying ASes of state-owned internet operatorsEsteban Carisimo, Alexander Gamero-Garrido, Alex C. Snoeren, Alberto Dainotti. 687-702 [doi]
- ASdb: a system for classifying owners of autonomous systemsMaya Ziv, Liz Izhikevich, Kimberly Ruth, Katherine Izhikevich, Zakir Durumeric. 703-719 [doi]
- Inferring regional access network topologies: methods and applicationsZesen Zhang, Alexander Marder, Ricky K. P. Mok, Bradley Huffaker, Matthew Luckie, Kimberly C. Claffy, Aaron Schulman. 720-738 [doi]
- Follow the scent: defeating IPv6 prefix rotation privacyErik C. Rye, Robert Beverly, Kimberly C. Claffy. 739-752 [doi]
- Towards identifying networks with internet clients using public dataWeifan Jiang, Tao Luo, Thomas Koch, Yunfan Zhang, Ethan Katz-Bassett, Matt Calder. 753-762 [doi]
- Corrigendum: cloud provider connectivity in the flat internetTodd Arnold, Jia He, Weifan Jiang, Matt Calder, Ítalo Cunha, Vasileios Giotsas, Ethan Katz-Bassett. 763-764 [doi]