Abstract is missing.
- Discovering the IPv6 Network PeripheryErik C. Rye, Robert Beverly. 3-18 [doi]
- Improving Coverage of Internet Outage Detection in Sparse BlocksGuillermo Baltra, John Heidemann. 19-36 [doi]
- FlowTrace : A Framework for Active Bandwidth Measurements Using In-band Packet TrainsAdnan Ahmed, Ricky Mok, Zubair Shafiq. 37-51 [doi]
- Leopard: Understanding the Threat of Blockchain Domain Name Based MalwareZhangrong Huang, Ji Huang, Tianning Zang. 55-70 [doi]
- To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI TodayCecilia Testart, Philipp Richter, Alistair King, Alberto Dainotti, David Clark. 71-87 [doi]
- A First Look at the Misuse and Abuse of the IPv4 Transfer MarketVasileios Giotsas, Ioana Livadariu, Petros Gigis. 88-103 [doi]
- Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound TrafficMaciej Korczynski, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda. 107-121 [doi]
- MUST, SHOULD, DON'T CARE: TCP Conformance in the WildMike Kosek, Leo Blöcher, Jan Rüth, Torsten Zimmermann, Oliver Hohlfeld. 122-138 [doi]
- Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD ExperimentsShahrooz Pouryousef, Muhammad Daniyal Dar, Suleman Ahmad, Phillipa Gill, Rishab Nithyanand. 141-157 [doi]
- Counterfighting Counterfeit: Detecting and Taking down Fraudulent Webshops at a ccTLDThymen Wabeke, Giovane C. M. Moura, Nanneke Franken, Cristian Hesselman. 158-174 [doi]
- When Parents and Children Disagree: Diving into DNS Delegation InconsistencyRaffaele Sommese, Giovane C. M. Moura, Mattijs Jonker, Roland van Rijswijk-Deij, Alberto Dainotti, Kimberly C. Claffy, Anna Sperotto. 175-189 [doi]
- A First Comparative Characterization of Multi-cloud Connectivity in Today's InternetBahador Yeganeh, Ramakrishnan Durairajan, Reza Rejaie, Walter Willinger. 193-210 [doi]
- Unintended Consequences: Effects of Submarine Cable Deployment on Internet RoutingRodérick Fanou, Bradley Huffaker, Ricky K. P. Mok, Kimberly C. Claffy. 211-227 [doi]
- Alias Resolution Based on ICMP Rate LimitingKevin Vermeulen, Burim Ljuma, Vamsi Addanki, Matthieu Gouel, Olivier Fourmaux, Timur Friedman, Reza Rejaie. 231-248 [doi]
- APPLE: Alias Pruning by Path Length EstimationAlexander Marder. 249-263 [doi]
- Dissecting the Workload of a Major Adult Video PortalAndreas Grammenos, Aravindh Raman, Timm Böttger, Zafar Gilani, Gareth Tyson. 267-279 [doi]
- Understanding Video Streaming Algorithms in the WildMelissa Licciardello, Maximilian Grüner, Ankit Singla. 298-313 [doi]
- Exploring the Eastern Frontier: A First Look at Mobile App Tracking in ChinaZhaohua Wang, Zhenyu Li 0001, Minhui Xue, Gareth Tyson. 314-328 [doi]