default search action
IMC 2014: Vancouver, BC, Canada
- Carey Williamson, Aditya Akella, Nina Taft:
Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014. ACM 2014, ISBN 978-1-4503-3213-2
Interdomain Routing and Traffic
- Mario A. Sánchez, Fabián E. Bustamante, Balachander Krishnamurthy, Walter Willinger, Georgios Smaragdakis, Jeffrey Erman:
Inter-Domain Traffic Estimation for the Outsider. 1-14 - Matthew J. Luckie, Amogh Dhamdhere, David D. Clark, Bradley Huffaker, kc claffy:
Challenges in Inferring Internet Interdomain Congestion. 15-22 - Vasileios Giotsas, Matthew J. Luckie, Bradley Huffaker, kc claffy:
Inferring Complex AS Relationships. 23-30 - Philipp Richter, Georgios Smaragdakis, Anja Feldmann, Nikolaos Chatzis, Jan Böttger, Walter Willinger:
Peering at Peerings: On the Role of IXP Route Servers. 31-44
Understanding (Mobile) Broadband Networks
- Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein:
Measuring the Reliability of Mobile Broadband Networks. 45-58 - John P. Rula, Fabian E. Bustamante:
Behind the Curtain: Cellular DNS and Content Replica Selection. 59-72 - Zachary S. Bischof, Fabian E. Bustamante, Rade Stanojevic:
Need, Want, Can Afford: Broadband Markets and the Behavior of Users. 73-86 - Lin Quan, John S. Heidemann, Yuri Pradkin:
When the internet sleeps: correlating diurnal networks with external factors. 87-100
Clouds and Social Networks
- Liang Wang, Antonio Nappa, Juan Caballero, Thomas Ristenpart, Aditya Akella:
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds. 101-114 - Zhenhua Li, Cheng Jin, Tianyin Xu, Christo Wilson, Yao Liu, Linsong Cheng, Yunhao Liu, Yafei Dai, Zhi-Li Zhang:
Towards Network-level Efficiency for Cloud Storage Services. 115-128 - Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar, Muhammad Zubair Shafiq:
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. 129-136 - Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:
Whispers in the dark: analysis of an anonymous social network. 137-150
Mobile Systems and Networks
- Qi Alfred Chen, Haokun Luo, Sanae Rosen, Zhuoqing Morley Mao, Karthik Iyer, Jie Hui, Kranthi Sontineni, Kevin Lau:
QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis. 151-164 - Fatima Zarinni, Ayon Chakraborty, Vyas Sekar, Samir R. Das, Phillipa Gill:
A First Look at Performance in Mobile Virtual Network Operators. 165-172 - Yi-Chao Chen, Yong Liao, Mario Baldi, Sung-Ju Lee, Lili Qiu:
OS Fingerprinting and Tethering Detection in Mobile Networks. 173-180 - Shuo Deng, Ravi Netravali, Anirudh Sivaraman, Hari Balakrishnan:
WiFi, LTE, or Both?: Measuring Multi-Homed Wireless Internet Performance. 181-194
Theory Underpinnings
- Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, Jessica Lowe:
Node Failure Localization via Network Tomography. 195-208 - Hao Wu, Hsu-Chun Hsiao, Yih-Chun Hu:
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. 209-222 - Zhenglin Yu, Zihui Ge, Ashwin Lall, Jia Wang, Jun (Jim) Xu, He Yan:
Crossroads: A Practical Data Sketching Solution for Mining Intersection of Streams. 223-234 - Paul Tune, Darryl Veitch:
OFSS: Skampling for the Flow Size Distribution. 235-240
Shedding Light on the Web
- Yasir Zaki, Jay Chen, Thomas Pötsch, Talal Ahmad, Lakshminarayanan Subramanian:
Dissecting Web Latency in Ghana. 241-248 - Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:
How Much Can We Micro-Cache Web Pages? 249-256 - Enric Pujol, Philipp Richter, Balakrishnan Chandrasekaran, Georgios Smaragdakis, Anja Feldmann, Bruce MacDowell Maggs, Keung-Chi Ng:
Back-Office Web Traffic on The Internet. 257-270
Internet Censorship
- Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi, Vern Paxson:
A Look at the Consequences of Internet Censorship Through an ISP Lens. 271-284 - Chaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar:
Censorship in the Wild: Analyzing Internet Filtering in Syria. 285-298 - Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill:
Automated Detection and Fingerprinting of Censorship Block Pages. 299-304
Insights into Networked System Operations
- Aniko Hannak, Gary Soeller, David Lazer, Alan Mislove, Christo Wilson:
Measuring Price Discrimination and Steering on E-commerce Web Sites. 305-318 - Sebastian Zander, Lachlan L. H. Andrew, Grenville J. Armitage:
Capturing ghosts: predicting the used IPv4 space by inferring unobserved addresses. 319-332 - Oliver Hohlfeld, Enric Pujol, Florin Ciucu, Anja Feldmann, Paul Barford:
A QoE Perspective on Sizing Network Buffers. 333-346
Illuminating Malicious Behavior
- Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage:
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. 347-358 - David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. 359-372 - Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, Giovanni Vigna:
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. 373-380
Measuring the Data and Control Planes
- Ramakrishnan Durairajan, Joel Sommers, Paul Barford:
Layer 1-informed Internet Topology Measurement. 381-394 - Wenji Wu, Phil DeMar:
WireCAP: a novel packet capture engine for commodity NICs in high-speed networks. 395-406 - Han Wang, Ki Suh Lee, Erluo Li, Chiunlin Lim, Ao Tang, Hakim Weatherspoon:
Timing is Everything: Accurate, Minimum Overhead, Available Bandwidth Estimation in High-speed Wired Networks. 407-420 - Giovanni Comarela, Mark Crovella:
Identifying and Analyzing High Impact Routing Events with PathMiner. 421-434
Attacks: A Deeper Look
- Jakub Czyz, Michael G. Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael D. Bailey, Manish Karir:
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. 435-448 - Roland van Rijswijk-Deij, Anna Sperotto, Aiko Pras:
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. 449-460 - Robin Sommer, Matthias Vallentin, Lorenzo De Carli, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. 461-474
SSL and Heartbleed
- Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. 475-488 - Liang Zhang, David R. Choffnes, Dave Levin, Tudor Dumitras, Alan Mislove, Aaron Schulman, Christo Wilson:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. 489-502 - Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. 503-510
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.