


default search action
IMC 2015: Tokyo, Japan
- Kenjiro Cho, Kensuke Fukuda, Vivek S. Pai, Neil Spring:

Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28-30, 2015. ACM 2015, ISBN 978-1-4503-3848-6
Measurements of Security, Attacks, and Fraud
- Mobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson:

Measurement and Analysis of Traffic Exchange Services. 1-12 - Matthew J. Luckie

, Robert Beverly
, Tiange Wu, Mark Allman, K. C. Claffy
:
Resilience of Deployed TCP to Blind Attacks. 13-26 - Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. 27-39 - Neha Chachra, Stefan Savage, Geoffrey M. Voelker:

Affiliate Crookies: Characterizing Affiliate Marketing Abuse. 41-47
Traffic and Routing
- Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot

, Benoit Donnet
:
MPLS Under the Microscope: Revealing Actual Transit Path Diversity. 49-62 - Stephen McQuistin

, Colin S. Perkins
:
Is Explicit Congestion Notification usable with UDP? 63-69 - Ruwaifa Anwar, Haseeb Niaz, David R. Choffnes, Ítalo S. Cunha, Phillipa Gill, Ethan Katz-Bassett:

Investigating Interdomain Routing Policies in the Wild. 71-77
Search and Ads
- Bhanu Chandra Vattikonda, Vacha Dave, Saikat Guha, Alex C. Snoeren:

Empirical Analysis of Search Advertising Strategies. 79-91 - Enric Pujol, Oliver Hohlfeld

, Anja Feldmann
:
Annoyed Users: Ads and Ad-Block Usage in the Wild. 93-106 - Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, Patrick D. McDaniel:

Measuring the Impact and Perception of Acceptable Advertisements. 107-120 - Chloe Kliman-Silver, Aniko Hannak, David Lazer, Christo Wilson

, Alan Mislove:
Location, Location, Location: The Impact of Geolocation on Web Search Personalization. 121-127
Bots and Clouds
- Dennis Andriesse, Christian Rossow, Herbert Bos

:
Reliable Recon in Adversarial Peer-to-Peer Botnets. 129-140 - Oana Goga

, Giridhari Venkatadri, Krishna P. Gummadi
:
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks. 141-153 - Raúl Gracia Tinedo, Yongchao Tian, Josep Sampé, Hamza Harkous, John Lenton, Pedro García López, Marc Sánchez Artigas, Marko Vukolic:

Dissecting UbuntuOne: Autopsy of a Global-scale Personal Cloud Back-end. 155-168 - Rui Miao, Rahul Potharaju, Minlan Yu, Navendu Jain:

The Dark Menace: Characterizing Network-based Attacks in the Cloud. 169-182
Trust & Security
- Yabing Liu, Will Tome, Liang Zhang, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Aaron Schulman, Christo Wilson

:
An End-to-End Measurement of Certificate Revocation in the Web's PKI. 183-196 - Kensuke Fukuda, John S. Heidemann:

Detecting Malicious Activity with DNS Backscatter. 197-210 - Dapeng Liu, Youjian Zhao, Haowen Xu, Yongqian Sun, Dan Pei

, Jiao Luo, Xiaowei Jing, Mei Feng:
Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning. 211-224
Mobile
- Huandong Wang

, Fengli Xu, Yong Li, Pengyu Zhang, Depeng Jin:
Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment. 225-238 - Arash Molavi Kakhki, Abbas Razaghpanah

, Anke Li, Hyungjoon Koo
, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove:
Identifying Traffic Differentiation in Mobile Networks. 239-251 - Kensuke Fukuda

, Hirochika Asai, Kenichi Nagami:
Tracking the Evolution and Diversity in Network Usage of Smartphones. 253-266 - Piotr Sapiezynski, Radu Gatej, Alan Mislove, Sune Lehmann

:
Opportunities and Challenges in Crowdsourced Wardriving. 267-273
Measurement and/or Platforms
- Paul Emmerich, Sebastian Gallenmüller

, Daniel Raumer, Florian Wohlfart, Georg Carle:
MoonGen: A Scriptable High-Speed Packet Generator. 275-287 - Frank Cangialosi, Dave Levin, Neil Spring:

Ting: Measuring and Exploiting Latencies Between All Tor Nodes. 289-302 - Ramakrishna Padmanabhan, Patrick Owen, Aaron Schulman, Neil Spring:

Timeouts: Beware Surprisingly High Delay. 303-316
WiFi and Mobile
- Xueheng Hu, Lixing Song, Dirk Van Bruggen, Aaron Striegel

:
Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput. 317-323 - Christina Vlachou, Sébastien Henri, Patrick Thiran:

Electri-Fi Your Data: Measuring and Combining Power-Line Communications with WiFi. 325-338 - Sanae Rosen, Ashkan Nikravesh, Yihua Guo

, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen:
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild. 339-345 - Sehyun Bae, Daehyun Ban, Dahyeon Han, Jiyoung Kim, Kyu-haeng Lee, Sangsoon Lim, Woojin Park, Chong-kwon Kim:

StreetSense: Effect of Bus Wi-Fi APs on Pedestrian Smartphone. 347-353
What's in a Name?
- Marc Kührer, Thomas Hupperich

, Jonas Bushart, Christian Rossow, Thorsten Holz
:
Going Wild: Large-Scale Classification of Open DNS Resolvers. 355-368 - Suqi Liu, Ian D. Foster

, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. 369-380 - Tristan Halvorson, Matthew F. Der, Ian D. Foster

, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. 381-394
Measurement and/or Platforms Deux
- Aaron Gember-Jacobson, Wenfei Wu, Xiujun Li, Aditya Akella, Ratul Mahajan:

Management Plane Analytics. 395-408 - Wenfei Wu, Keqiang He, Aditya Akella:

PerfSight: Performance Diagnosis for Software Dataplanes. 409-421 - Karyn Benson, Alberto Dainotti

, K. C. Claffy
, Alex C. Snoeren, Michael G. Kallitsis
:
Leveraging Internet Background Radiation for Opportunistic Network Analysis. 423-436 - Thomas Holterbach, Cristel Pelsser

, Randy Bush, Laurent Vanbever:
Quantifying Interference between Measurements on the RIPE Atlas Platform. 437-443
China and Cuba
- Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:

Examining How the Great Firewall Discovers Hidden Circumvention Servers. 445-458 - Huoran Li, Xuan Lu

, Xuanzhe Liu
, Tao Xie, Kaigui Bian, Felix Xiaozhu Lin, Qiaozhu Mei, Feng Feng:
Characterizing Smartphone Usage Patterns from Millions of Android Users. 459-472 - Zhenhua Li, Christo Wilson

, Tianyin Xu, Yao Liu, Zhen Lu, Yinlong Wang:
Offline Downloading in China: A Comparative Study. 473-486 - Zachary S. Bischof

, John P. Rula, Fabián E. Bustamante:
In and Out of Cuba: Characterizing Cuba's Connectivity. 487-493
Analyses
- Le Chen, Alan Mislove, Christo Wilson

:
Peeking Beneath the Hood of Uber. 495-508 - David Plonka, Arthur W. Berger:

Temporal and Spatial Classification of Active IPv6 Addresses. 509-522 - Yi-Ching Chiu, Brandon Schlinker, Abhishek Balaji Radhakrishnan, Ethan Katz-Bassett, Ramesh Govindan:

Are We One Hop Away from a Better Internet? 523-529 - Matt Calder, Ashley Flavel, Ethan Katz-Bassett, Ratul Mahajan, Jitendra Padhye:

Analyzing the Performance of an Anycast CDN. 531-537

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














