Abstract is missing.
- Exploring Tor's Activity Through Long-Term Passive TLS Traffic MeasurementJohanna Amann, Robin Sommer. 3-15 [doi]
- Measuring the Latency and Pervasiveness of TLS Certificate RevocationLiang Zhu, Johanna Amann, John S. Heidemann. 16-29 [doi]
- Tracking Personal Identifiers Across the WebMarjan Falahrastegar, Hamed Haddadi, Steve Uhlig, Richard Mortier. 30-41 [doi]
- Like a Pack of Wolves: Community Structure of Web TrackersVasiliki Kalavri, Jeremy Blackburn, Matteo Varvello, Konstantina Papagiannaki. 42-54 [doi]
- A First Analysis of Multipath TCP on SmartphonesQuentin De Coninck, Matthieu Baerts, Benjamin Hesmans, Olivier Bonaventure. 57-69 [doi]
- Crowdsourcing Measurements of Mobile Network Performance and Mobility During a Large Scale EventAlexander Frömmgen, Jens Heuschkel, Patrick Jahnke, Fabio Cuozzo, Immanuel Schweizer, Patrick Eugster, Max Mühlhäuser, Alejandro P. Buchmann. 70-82 [doi]
- A Study of MVNO Data Paths and PerformancePaul Schmitt, Morgan Vigil, Elizabeth M. Belding. 83-94 [doi]
- Detecting Cellular Middleboxes Using Passive Measurement TechniquesUtkarsh Goel, Moritz Steiner, Mike P. Wittie, Martin Flack, Stephen Ludin. 95-107 [doi]
- Home Network or Access Link? Locating Last-Mile Downstream Throughput BottlenecksSrikanth Sundaresan, Nick Feamster, Renata Teixeira. 111-123 [doi]
- A Case Study of Traffic Demand Response to Broadband Service-Plan UpgradesSarthak Grover, Roya Ensafi, Nick Feamster. 124-135 [doi]
- eXploring Xfinity - A First Look at Provider-Enabled Community NetworksDipendra K. Jha, John P. Rula, Fabián E. Bustamante. 136-148 [doi]
- NAT Revelio: Detecting NAT444 in the ISPAndra Lutu, Marcelo Bagnulo, Amogh Dhamdhere, Kimberly C. Claffy. 149-161 [doi]
- GPLMT: A Lightweight Experimentation and Testbed Management FrameworkMatthias Wachs, Nadine Herold, Stephan-Alexander Posselt, Florian Dold, Georg Carle. 165-176 [doi]
- Periscope: Unifying Looking Glass QueryingVasileios Giotsas, Amogh Dhamdhere, Kimberly C. Claffy. 177-189 [doi]
- Analyzing Locality of Mobile Messaging Traffic using the MATAdOR FrameworkQuirin Scheitle, Matthias Wachs, Johannes Zirngibl, Georg Carle. 190-202 [doi]
- Scout: A Point of Presence Recommendation System Using Real User Monitoring DataYang Yang, Liang Zhang, Ritesh Maheshwari, Zaid Ali Kahn, Deepak Agarwal, Sanjay Dubey. 205-217 [doi]
- Is the Web HTTP/2 Yet?Matteo Varvello, Kyle Schomp, David Naylor, Jeremy Blackburn, Alessandro Finamore, Konstantina Papagiannaki. 218-232 [doi]
- Modeling HTTP/2 Speed from HTTP/1 TracesKyriakos Zarifis, Mark Holland, Manish Jain, Ethan Katz-Bassett, Ramesh Govindan. 233-247 [doi]
- Behind Box-Office Sales: Understanding the Mechanics of Automation Spam in ClassifiedsAndrew J. Kaizer, Minaxi Gupta, Mejbaol Sajib, Anirban Acharjee, Qatrunnada Ismail. 248-260 [doi]
- Towards a Model of DNS Client BehaviorKyle Schomp, Michael Rabinovich, Mark Allman. 263-275 [doi]
- Detecting DNS Root ManipulationBen Jones, Nick Feamster, Vern Paxson, Nicholas Weaver, Mark Allman. 276-288 [doi]
- Behind IP Prefix Overlaps in the BGP Routing TableQuentin Jacquemart, Guillaume Urvoy-Keller, Ernst Biersack. 289-301 [doi]
- Characterizing Rule Compression Mechanisms in Software-Defined NetworksCurtis Yu, Cristian Lumezanu, Harsha V. Madhyastha, Guofei Jiang. 302-315 [doi]
- Blackholing at IXPs: On the Effectiveness of DDoS Mitigation in the WildChristoph Dietzel, Anja Feldmann, Thomas King. 319-332 [doi]
- Dissecting the Largest National Ecosystem of Public Internet eXchange Points in BrazilSamuel Henrique Bucke Brito, Mateus A. S. Santos, Ramon dos Reis Fontes, Danny Alex Lachos Perez, Christian Esteve Rothenberg. 333-345 [doi]
- traIXroute: Detecting IXPs in traceroute pathsGeorge Nomikos, Xenofontas Dimitropoulos. 346-358 [doi]
- A Brief History of MPLS Usage in IPv6Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet. 359-370 [doi]
- An Empirical Study of Android Alarm Usage for Application SchedulingMário Almeida, Muhammad Bilal, Jeremy Blackburn, Konstantina Papagiannaki. 373-384 [doi]
- Network Timing and the 2015 Leap SecondDarryl Veitch, Kanthaiah Vijayalayan. 385-396 [doi]
- Can Machine Learning Benefit Bandwidth Estimation at Ultra-high Speeds?Qianwen Yin, Jasleen Kaur. 397-411 [doi]