Abstract is missing.
- W-Bad: Interception, Inspection, and Interference with Web Proxy Auto-Discovery (WPAD)Casey T. Deccio. 1-10 [doi]
- Live Long and Prosper: Analyzing Long-Lived MOAS Prefixes in BGPKhwaja Zubair Sediqi, Anja Feldmann, Oliver Gasser. 1-10 [doi]
- I Refuse if You Let Me: Studying User Behavior with Privacy Banners at ScaleNikhil Jha, Martino Trevisan, Marco Mellia, Rodrigo Irarrazaval, Daniel Fernandez. 1-9 [doi]
- Not all DGAs are Born the Same - Improving Lexicographic based Detection of DGA Domains through AI/MLLucas Torrealba Aravena, Pedro Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik. 1-4 [doi]
- Hazardous Echoes: The DNS Resolvers that Should Be Put on MuteRamin Yazdani, Yevheniya Nosyk, Ralph Holz, Maciej Korczynski, Mattijs Jonker, Anna Sperotto. 1-10 [doi]
- Investigating Gaze Behavior in Phishing Email IdentificationFrancesco Pietrantonio, Alessio Botta, Giorgio Ventre, Luigi Gallo, Stefania Zinno, Laura Mancuso, Roberta Presta. 1-4 [doi]
- Target Acquired? Evaluating Target Generation Algorithms for IPv6Lion Steger, Liming Kuang, Johannes Zirngibl, Georg Carle, Oliver Gasser. 1-10 [doi]
- A Worldwide Look Into Mobile Access Networks Through the Eyes of AmiGosMatteo Varvello, Yasir Zaki. 1-10 [doi]
- Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time MeasurementsElisa Chiapponi, Marc Dacier, Olivier Thonnard. 1-4 [doi]
- Packet Field Tree: a hybrid approach to automated protocol reverse-engineeringAlex Rohl, Matthew Roughan, Martin White, Alexander Chambers. 1-4 [doi]
- Phishing in Style: Characterizing Phishing Websites in the WildDavid Hasselquist, Elsa Kihlberg Gawell, Axel Karlström, Niklas Carlsson. 1-4 [doi]
- Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video CallsLaurenz Grote, Ike Kunze, Constantin Sander, Klaus Wehrle. 1-10 [doi]
- France Through the Lens of Mobile Traffic DataOrlando E. Martínez-Durive, Sachit Mishra, Cezary Ziemlicki, Stefania Rubrichi, Zbigniew Smoreda, Marco Fiore. 1-4 [doi]
- Many or Few Samples?: Comparing Transfer, Contrastive and Meta-Learning in Encrypted Traffic ClassificationIdio Guarino, Chao Wang, Alessandro Finamore, Antonio Pescapè, Dario Rossi 0001. 1-10 [doi]
- Bias in Internet Measurement PlatformsPavlos Sermpezis, Lars Prehn, Sofia Kostoglou, Marcel Flores, Athena Vakali, Emile Aben. 1-10 [doi]
- dMAPAR-HMM: Reforming Traffic Model for Improving Performance Bound with Stochastic Network CalculusQingqing Yang, Xi Peng 0006, Huiwen Yang, Gong Zhang, Bo Bai 0001. 1-9 [doi]
- Longitudinal Analysis of Inter-City Network DelaysSelim Ozcan, Ioana Livadariu, Georgios Smaragdakis, Carsten Griwodz. 1-9 [doi]
- Errare humanum est: What do RFC Errata say about Internet Standards?Stephen McQuistin, Mladen Karan, Prashant Khare, Colin Perkins, Matthew Purver, Patrick Healey, Ignacio Castro, Gareth Tyson. 1-9 [doi]
- Detecting IP-tracking proof interfaces by looking for NATsAurélien Buchet, Peter Snyder, Hamed Haddadi, Cristel Pelsser. 1-4 [doi]
- An Initial Look into the Performance Evolution of 5G Non-Standalone NetworksGiuseppe Caso, Mohammad Rajiullah, Konstantinos Kousias, Usman Ali 0007, Luca De Nardis, Anna Brunström, Ozgu Alay, Marco Neri, Maria-Gabriella Di Benedetto. 1-4 [doi]
- Deep Generative Replay for Multivariate Time-Series Monitoring with Variational AutoencodersGastón García González, Pedro Casas, Alicia Fernández. 1-4 [doi]
- Unevenly Spaced Time Series from Network TrafficJosef Koumar, Tomás Cejka. 1-4 [doi]
- Your Code is 0000: An Analysis of the Disposable Phone Numbers EcosystemJosé Miguel Moreno, Srdjan Matic, Narseo Vallina-Rodriguez, Juan Tapiador. 1-10 [doi]
- An Analysis of War Impact on Ukrainian Critical Infrastructure Through Network MeasurementsRishabh Singla, Shreyas Srinivasa, A. L. Narasimha Reddy, Jens Myrup Pedersen, Emmanouil Vasilomanolakis, Riccardo Bettati. 1-10 [doi]
- Encrypted traffic classification: the QUIC caseJan Luxemburk, Karel Hynek, Tomás Cejka. 1-10 [doi]