default search action
IMC 2018: Boston, MA, USA
- Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. ACM 2018, ISBN 978-1-4503-5619-0
- Mallesham Dasari, Santiago Vargas, Arani Bhattacharya, Aruna Balasubramanian, Samir R. Das, Michael Ferdman:
Impact of Device Performance on Mobile Internet QoE. 1-7 - Giovane C. M. Moura, John S. Heidemann, Moritz Müller, Ricardo de Oliveira Schmidt, Marco Davids:
When the Dike Breaks: Dissecting DNS Defenses During DDoS. 8-21 - Piet De Vaere, Tobias Bühler, Mirja Kühlewind, Brian Trammell:
Three Bits Suffice: Explicit Support for Passive Measurement of Internet Latency in QUIC and TCP. 22-28 - Kevin Vermeulen, Stephen D. Strowes, Olivier Fourmaux, Timur Friedman:
Multilevel MDA-Lite Paris Traceroute. 29-42 - Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:
Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. 43-55 - Alexander Marder, Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, kc claffy, Jonathan M. Smith:
Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. 56-69 - Jan Rüth, Torsten Zimmermann, Konrad Wolsing, Oliver Hohlfeld:
Digging into Browser-based Crypto Mining. 70-76 - Harini Kolamunna, Ilias Leontiadis, Diego Perino, Suranga Seneviratne, Kanchana Thilakarathna, Aruna Seneviratne:
A First Look at SIM-Enabled Wearables in the Wild. 77-83 - Mark Allman:
Comments on DNS Robustness. 84-90 - Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael D. Bailey:
Measuring Ethereum Network Peers. 91-104 - Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, John P. Rula, Nick Sullivan, Christo Wilson:
Is the Web Ready for OCSP Must-Staple? 105-118 - Liang Zhu, John S. Heidemann:
LDplayer: DNS Experimentation at Scale. 119-132 - Armin Sarabi, Mingyan Liu:
Characterizing the Internet Host Population Using Deep Learning: A Universal and Lightweight Numerical Embedding. 133-146 - Haotian Deng, Chunyi Peng, Ans Fida, Jiayi Meng, Y. Charlie Hu:
Mobility Support in Cellular Networks: A Measurement Study on Its Configurations and Implications. 147-160 - Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, Laura Ogden:
Predictive Analysis in Network Function Virtualization. 161-167 - Rachee Singh, Arun Dunna, Phillipa Gill:
Characterizing the Deployment and Performance of Multi-CDNs. 168-174 - Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:
Understanding Tor Usage with Privacy-Preserving Measurement. 175-187 - Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil:
On the Origins of Memes by Means of Fringe Web Communities. 188-202 - Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, Phillipa Gill:
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation. 203-217 - Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi:
403 Forbidden: A Global View of CDN Geoblocking. 218-230 - Kensuke Fukuda, John S. Heidemann:
Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning. 231-237 - Zahaib Akhtar, Yun Seong Nam, Jessica Chen, Ramesh Govindan, Ethan Katz-Bassett, Sanjay G. Rao, Jibin Zhan, Hui Zhang:
Understanding Video Management Planes. 238-251 - Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. 252-264 - George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos, Vasileios Giotsas:
O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs. 265-278 - Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann, Cristel Pelsser, Georgios Smaragdakis, Randy Bush:
BGP Communities: Even more Worms in the Routing Can. 279-292 - Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. 293-307 - Robert Beverly, Ramakrishnan Durairajan, David Plonka, Justin P. Rohrer:
In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery. 308-321 - Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:
From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. 322-328 - Costas Iordanou, Georgios Smaragdakis, Ingmar Poese, Nikolaos Laoutaris:
Tracing Cross Border Web Tracking. 329-342 - Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:
The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. 343-349 - Philipp Richter, Ramakrishna Padmanabhan, Neil Spring, Arthur W. Berger, David Clark:
Advancing the Art of Internet Edge Outage Detection. 350-363 - Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:
Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. 364-378 - Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis:
An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. 379-392 - Justin Meza, Tianyin Xu, Kaushik Veeraraghavan, Onur Mutlu:
A Large Scale Study of Data Center Network Reliability. 393-407 - Jeremias Blendin, Fabrice Bendfeldt, Ingmar Poese, Boris Koldehofe, Oliver Hohlfeld:
Dissecting Apple's Meta-CDN during an iOS Update. 408-414 - Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:
Coming of Age: A Longitudinal Study of TLS Deployment. 415-428 - Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. 429-442 - Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:
An Empirical Analysis of the Commercial VPN Ecosystem. 443-456 - Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:
A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. 457-463 - Arjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, Alex C. Snoeren:
Cloud Datacenter SDN Monitoring: Experiences and Challenges. 464-470 - Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:
How Tracking Companies Circumvented Ad Blockers Using WebSockets. 471-477 - Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez:
A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. 478-493 - Lucianna Kiffer, Dave Levin, Alan Mislove:
Analyzing Ethereum's Contract Topology. 494-499
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.