default search action
IMC 2017: London, UK
- Steve Uhlig, Olaf Maennel:
Proceedings of the 2017 Internet Measurement Conference, IMC 2017, London, United Kingdom, November 1-3, 2017. ACM 2017, ISBN 978-1-4503-5118-8
Inference
- Vasileios Giotsas, Philipp Richter, Georgios Smaragdakis, Anja Feldmann, Christoph Dietzel, Arthur W. Berger:
Inferring BGP blackholing activity in the internet. 1-14 - Romain Fontugne, Cristel Pelsser, Emile Aben, Randy Bush:
Pinpointing delay and forwarding anomalies using large-scale traceroute measurements. 15-28 - Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
Through the wormhole: tracking invisible MPLS tunnels. 29-42
Congestion
- Srikanth Sundaresan, Xiaohong Deng, Yun Feng, Danny Lee, Amogh Dhamdhere:
Challenges in inferring internet congestion using throughput measurements. 43-56 - Rodérick Fanou, Francisco Valera, Amogh Dhamdhere:
Investigating the causes of congestion on the african IXP substrate. 57-63 - Srikanth Sundaresan, Mark Allman, Amogh Dhamdhere, kc claffy:
TCP congestion signatures. 64-77 - Qiao Zhang, Vincent Liu, Hongyi Zeng, Arvind Krishnamurthy:
High-resolution measurement of data center microbursts. 78-85
Denial
- Franziska Lichtblau, Florian Streibelt, Thorben Krüger, Philipp Richter, Anja Feldmann:
Detection, classification, and analysis of inter-domain traffic with spoofed source IP addresses. 86-99 - Mattijs Jonker, Alistair King, Johannes Krupp, Christian Rossow, Anna Sperotto, Alberto Dainotti:
Millions of targets under attack: a macroscopic characterization of the DoS ecosystem. 100-113
Circumvention
- Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy:
Your state is not mine: a closer look at evading stateful internet censorship. 114-127 - Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki, David R. Choffnes, Phillipa Gill, Alan Mislove:
lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently. 128-141
Advertising
- Panagiotis Papadopoulos, Pablo Rodríguez Rodríguez, Nicolas Kourtellis, Nikolaos Laoutaris:
If you are not paying for it, you are the product: how much do advertisers pay to reach you? 142-156 - Joe DeBlasio, Saikat Guha, Geoffrey M. Voelker, Alex C. Snoeren:
Exploring the dynamics of search advertiser fraud. 157-170 - Umar Iqbal, Zubair Shafiq, Zhiyun Qian:
The ad wars: retrospective measurement and analysis of anti-adblock filter lists. 171-183 - Jeffery Kline, Paul Barford, Aaron Cahn, Joel Sommers:
On the structure and characteristics of user agent string. 184-190
Wireless
- John P. Rula, Fabián E. Bustamante, Moritz Steiner:
Cell spotting: studying the role of cellular networks in the internet. 191-204 - Apurv Bhartia, Bo Chen, Feng Wang, Derrick Pallas, Raluca Musaloiu-E, Ted Tsung-Te Lai, Hao Ma:
Measurement-based, practical techniques to improve 802.11ac performance. 205-219 - Shichang Xu, Subhabrata Sen, Zhuoqing Morley Mao, Yunhan Jia:
Dissecting VOD services for cellular: performance, root causes and best practices. 220-234 - Carlos Eduardo de Andrade, Simon D. Byers, Vijay Gopalakrishnan, Emir Halepovic, David J. Poole, Lien K. Tran, Christopher T. Volinsky:
Connected cars in cellular network: a measurement study. 235-241
Methods
- Austin Murdock, Frank Li, Paul Bramsen, Zakir Durumeric, Vern Paxson:
Target generation for internet-wide IPv6 scanning. 242-253 - Kirill Levchenko, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Mark Allman, Vern Paxson:
Packetlab: a universal measurement endpoint interface. 254-260 - Joel Sommers, Ramakrishnan Durairajan, Paul Barford:
Automatic metadata generation for active measurement. 261-267 - Daniel Anderson, Pryce Bevan, Kevin J. Lang, Edo Liberty, Lee Rhodes, Justin Thaler:
A high-performance algorithm for identifying frequent items in data streams. 268-282 - Kenjiro Cho:
Recursive lattice search: hierarchical heavy hitters revisited. 283-289
Protocols in the wild
- Arash Molavi Kakhki, Samuel Jero, David R. Choffnes, Cristina Nita-Rotaru, Alan Mislove:
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols. 290-303 - Jan Rüth, Christian Bormann, Oliver Hohlfeld:
Large-scale scanning of TCP's initial window. 304-310 - Brian J. Goodchild, Yi-Ching Chiu, Rob Hansen, Haonan Lu, Matt Calder, Matthew J. Luckie, Wyatt Lloyd, David R. Choffnes, Ethan Katz-Bassett:
The record route option is an option! 311-317 - Eduardo E. P. Pujol, Will Scott, Eric Wustrow, J. Alex Halderman:
Initial measurements of the cuban street network. 318-324
Security
- Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, Ralph Holz:
Mission accomplished?: HTTPS security after diginotar. 325-340 - Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren:
Tripwire: inferring internet site compromise. 341-354 - Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating oauth access token abuse by collusion networks. 355-368 - Taejoong Chung, Roland van Rijswijk-Deij, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Understanding the role of registrars in DNSSEC deployment. 369-383
Hot topics
- Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Complexity vs. performance: empirical analysis of machine learning as a service. 384-397 - Xianghang Mi, Feng Qian, Ying Zhang, XiaoFeng Wang:
An empirical characterization of IFTTT: ecosystem, usage, and performance. 398-404 - Savvas Zannettou, Tristan Caulfield, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Michael Sirivianos, Gianluca Stringhini, Jeremy Blackburn:
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources. 405-417
Abuse & ethics
- Janos Szurdi, Nicolas Christin:
Email typosquatting. 419-431 - Peter Snyder, Periwinkle Doerfler, Chris Kanich, Damon McCoy:
Fifteen minutes of unwanted fame: detecting and characterizing doxing. 432-444 - Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R. Beresford:
Ethical issues in research using datasets of illicit origin. 445-462
Infrastructure
- Manaf Gharaibeh, Anant Shah, Bradley Huffaker, Han Zhang, Roya Ensafi, Christos Papadopoulos:
A look at router geolocation in public and commercial databases. 463-469 - Vasileios Kotronis, George Nomikos, Lefteris Manassakis, Dimitris Mavrommatis, Xenofontas A. Dimitropoulos:
Shortcuts through colocation facilities. 470-476 - Wouter B. de Vries, Ricardo de Oliveira Schmidt, Wes Hardaker, John S. Heidemann, Pieter-Tjerk de Boer, Aiko Pras:
Broad and load-aware anycast mapping with verfploeter. 477-488 - Moritz Müller, Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann:
Recursives in the wild: engineering authoritative DNS servers. 489-495
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.