


default search action
IMC 2014: Vancouver, BC, Canada
- Carey Williamson, Aditya Akella, Nina Taft:

Proceedings of the 2014 Internet Measurement Conference, IMC 2014, Vancouver, BC, Canada, November 5-7, 2014. ACM 2014, ISBN 978-1-4503-3213-2
Interdomain Routing and Traffic
- Mario A. Sánchez, Fabián E. Bustamante, Balachander Krishnamurthy, Walter Willinger, Georgios Smaragdakis

, Jeffrey Erman:
Inter-Domain Traffic Estimation for the Outsider. 1-14 - Matthew J. Luckie, Amogh Dhamdhere, David D. Clark, Bradley Huffaker, K. C. Claffy

:
Challenges in Inferring Internet Interdomain Congestion. 15-22 - Vasileios Giotsas

, Matthew J. Luckie, Bradley Huffaker, K. C. Claffy
:
Inferring Complex AS Relationships. 23-30 - Philipp Richter

, Georgios Smaragdakis
, Anja Feldmann
, Nikolaos Chatzis, Jan Böttger, Walter Willinger:
Peering at Peerings: On the Role of IXP Route Servers. 31-44
Understanding (Mobile) Broadband Networks
- Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein:

Measuring the Reliability of Mobile Broadband Networks. 45-58 - John P. Rula, Fabian E. Bustamante:

Behind the Curtain: Cellular DNS and Content Replica Selection. 59-72 - Zachary S. Bischof

, Fabian E. Bustamante, Rade Stanojevic:
Need, Want, Can Afford: Broadband Markets and the Behavior of Users. 73-86 - Lin Quan, John S. Heidemann, Yuri Pradkin:

When the internet sleeps: correlating diurnal networks with external factors. 87-100
Clouds and Social Networks
- Liang Wang, Antonio Nappa

, Juan Caballero, Thomas Ristenpart, Aditya Akella:
WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds. 101-114 - Zhenhua Li, Cheng Jin, Tianyin Xu, Christo Wilson

, Yao Liu, Linsong Cheng, Yunhao Liu, Yafei Dai, Zhi-Li Zhang:
Towards Network-level Efficiency for Cloud Storage Services. 115-128 - Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kâafar

, Muhammad Zubair Shafiq:
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. 129-136 - Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao:

Whispers in the dark: analysis of an anonymous social network. 137-150
Mobile Systems and Networks
- Qi Alfred Chen, Haokun Luo, Sanae Rosen, Zhuoqing Morley Mao, Karthik Iyer, Jie Hui, Kranthi Sontineni, Kevin Lau:

QoE Doctor: Diagnosing Mobile App QoE with Automated UI Control and Cross-layer Analysis. 151-164 - Fatima Zarinni, Ayon Chakraborty, Vyas Sekar, Samir R. Das, Phillipa Gill:

A First Look at Performance in Mobile Virtual Network Operators. 165-172 - Yi-Chao Chen, Yong Liao, Mario Baldi, Sung-Ju Lee, Lili Qiu:

OS Fingerprinting and Tethering Detection in Mobile Networks. 173-180 - Shuo Deng, Ravi Netravali, Anirudh Sivaraman, Hari Balakrishnan:

WiFi, LTE, or Both?: Measuring Multi-Homed Wireless Internet Performance. 181-194
Theory Underpinnings
- Liang Ma, Ting He, Ananthram Swami, Don Towsley

, Kin K. Leung, Jessica Lowe:
Node Failure Localization via Network Tomography. 195-208 - Hao Wu, Hsu-Chun Hsiao

, Yih-Chun Hu:
Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. 209-222 - Zhenglin Yu, Zihui Ge, Ashwin Lall, Jia Wang, Jun (Jim) Xu, He Yan:

Crossroads: A Practical Data Sketching Solution for Mining Intersection of Streams. 223-234 - Paul Tune, Darryl Veitch:

OFSS: Skampling for the Flow Size Distribution. 235-240
Shedding Light on the Web
- Yasir Zaki

, Jay Chen, Thomas Pötsch, Talal Ahmad, Lakshminarayanan Subramanian:
Dissecting Web Latency in Ghana. 241-248 - Xiao Sophia Wang, Arvind Krishnamurthy, David Wetherall:

How Much Can We Micro-Cache Web Pages? 249-256 - Enric Pujol, Philipp Richter

, Balakrishnan Chandrasekaran
, Georgios Smaragdakis
, Anja Feldmann
, Bruce MacDowell Maggs, Keung-Chi Ng:
Back-Office Web Traffic on The Internet. 257-270
Internet Censorship
- Sheharbano Khattak, Mobin Javed, Syed Ali Khayam, Zartash Afzal Uzmi

, Vern Paxson:
A Look at the Consequences of Internet Censorship Through an ISP Lens. 271-284 - Chaabane Abdelberi, Terence Chen, Mathieu Cunche, Emiliano De Cristofaro, Arik Friedman, Mohamed Ali Kâafar

:
Censorship in the Wild: Analyzing Internet Filtering in Syria. 285-298 - Ben Jones, Tzu-Wen Lee, Nick Feamster, Phillipa Gill:

Automated Detection and Fingerprinting of Censorship Block Pages. 299-304
Insights into Networked System Operations
- Aniko Hannak, Gary Soeller, David Lazer, Alan Mislove, Christo Wilson

:
Measuring Price Discrimination and Steering on E-commerce Web Sites. 305-318 - Sebastian Zander, Lachlan L. H. Andrew, Grenville J. Armitage:

Capturing ghosts: predicting the used IPv4 space by inferring unobserved addresses. 319-332 - Oliver Hohlfeld

, Enric Pujol, Florin Ciucu, Anja Feldmann
, Paul Barford:
A QoE Perspective on Sizing Network Buffers. 333-346
Illuminating Malicious Behavior
- Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage:

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild. 347-358 - David Y. Wang, Matthew F. Der, Mohammad Karami, Lawrence K. Saul, Damon McCoy, Stefan Savage, Geoffrey M. Voelker:

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. 359-372 - Apostolis Zarras

, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz
, Christopher Kruegel, Giovanni Vigna:
The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. 373-380
Measuring the Data and Control Planes
- Ramakrishnan Durairajan, Joel Sommers, Paul Barford:

Layer 1-informed Internet Topology Measurement. 381-394 - Wenji Wu

, Phil DeMar:
WireCAP: a novel packet capture engine for commodity NICs in high-speed networks. 395-406 - Han Wang, Ki Suh Lee, Erluo Li, Chiunlin Lim, Ao Tang, Hakim Weatherspoon:

Timing is Everything: Accurate, Minimum Overhead, Available Bandwidth Estimation in High-speed Wired Networks. 407-420 - Giovanni Comarela, Mark Crovella:

Identifying and Analyzing High Impact Routing Events with PathMiner. 421-434
Attacks: A Deeper Look
- Jakub Czyz, Michael G. Kallitsis

, Manaf Gharaibeh
, Christos Papadopoulos, Michael D. Bailey, Manish Karir:
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks. 435-448 - Roland van Rijswijk-Deij

, Anna Sperotto
, Aiko Pras:
DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. 449-460 - Robin Sommer, Matthias Vallentin, Lorenzo De Carli

, Vern Paxson:
HILTI: an Abstract Execution Environment for Deep, Stateful Network Traffic Analysis. 461-474
SSL and Heartbleed
- Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:

The Matter of Heartbleed. 475-488 - Liang Zhang, David R. Choffnes, Dave Levin, Tudor Dumitras, Alan Mislove, Aaron Schulman, Christo Wilson

:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. 489-502 - Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler

:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. 503-510

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














