Abstract is missing.
- From Power to Water: Dissecting SCADA Networks Across Different Critical InfrastructuresNeil Ortiz Silva, Martin Rosso, Emmanuele Zambon, Jerry den Hartog, Alvaro A. Cárdenas. 3-31 [doi]
- Inside the Engine Room: Investigating Steam's Content Delivery Platform Infrastructure in the Era of 100GB GamesChristoff Visser, Romain Fontugne. 32-60 [doi]
- Network Anatomy and Real-Time Measurement of Nvidia GeForce NOW Cloud GamingMinzhao Lyu, Sharat Chandra Madanapalli, Arun Vishwanath, Vijay Sivaraman. 61-91 [doi]
- Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and HoneynetLiang Zhao, Satoru Kobayashi, Kensuke Fukuda. 95-111 [doi]
- A First Look at NAT64 Deployment In-The-WildAmanda Hsu, Frank Li 0001, Paul Pearce, Oliver Gasser. 112-129 [doi]
- Dom-BERT: Detecting Malicious Domains with Pre-training ModelYu Tian, Zhenyu Li. 133-158 [doi]
- Data Augmentation for Traffic ClassificationChao Wang, Alessandro Finamore, Pietro Michiardi, Massimo Gallo, Dario Rossi 0001. 159-186 [doi]
- Towards Improving Outage Detection with Multiple Probing ProtocolsManasvini Sethuraman, Zachary S. Bischof, Alberto Dainotti. 189-205 [doi]
- WHOIS Right? An Analysis of WHOIS and RDAP ConsistencySimon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczynski. 206-231 [doi]
- Spoofed Emails: An Analysis of the Issues Hindering a Larger Deployment of DMARCOlivier Hureau, Jan Bayer, Andrzej Duda, Maciej Korczynski. 232-261 [doi]
- Designing a Lightweight Network Observability Agent for Cloud ApplicationsPravein Govindan Kannan, Shachee Mishra Gupta, Dushyant Behl, Eran Raichstein, Joel Takvorian. 262-276 [doi]
- Crawling to the Top: An Empirical Evaluation of Top List UseQinge Xie, Frank Li 0001. 277-306 [doi]