default search action
IMC 2015: Tokyo, Japan
- Kenjiro Cho, Kensuke Fukuda, Vivek S. Pai, Neil Spring:
Proceedings of the 2015 ACM Internet Measurement Conference, IMC 2015, Tokyo, Japan, October 28-30, 2015. ACM 2015, ISBN 978-1-4503-3848-6
Measurements of Security, Attacks, and Fraud
- Mobin Javed, Cormac Herley, Marcus Peinado, Vern Paxson:
Measurement and Analysis of Traffic Exchange Services. 1-12 - Matthew J. Luckie, Robert Beverly, Tiange Wu, Mark Allman, kc claffy:
Resilience of Deployed TCP to Blind Attacks. 13-26 - Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. 27-39 - Neha Chachra, Stefan Savage, Geoffrey M. Voelker:
Affiliate Crookies: Characterizing Affiliate Marketing Abuse. 41-47
Traffic and Routing
- Yves Vanaubel, Pascal Mérindol, Jean-Jacques Pansiot, Benoit Donnet:
MPLS Under the Microscope: Revealing Actual Transit Path Diversity. 49-62 - Stephen McQuistin, Colin S. Perkins:
Is Explicit Congestion Notification usable with UDP? 63-69 - Ruwaifa Anwar, Haseeb Niaz, David R. Choffnes, Ítalo S. Cunha, Phillipa Gill, Ethan Katz-Bassett:
Investigating Interdomain Routing Policies in the Wild. 71-77
Search and Ads
- Bhanu Chandra Vattikonda, Vacha Dave, Saikat Guha, Alex C. Snoeren:
Empirical Analysis of Search Advertising Strategies. 79-91 - Enric Pujol, Oliver Hohlfeld, Anja Feldmann:
Annoyed Users: Ads and Ad-Block Usage in the Wild. 93-106 - Robert J. Walls, Eric D. Kilmer, Nathaniel Lageman, Patrick D. McDaniel:
Measuring the Impact and Perception of Acceptable Advertisements. 107-120 - Chloe Kliman-Silver, Aniko Hannak, David Lazer, Christo Wilson, Alan Mislove:
Location, Location, Location: The Impact of Geolocation on Web Search Personalization. 121-127
Bots and Clouds
- Dennis Andriesse, Christian Rossow, Herbert Bos:
Reliable Recon in Adversarial Peer-to-Peer Botnets. 129-140 - Oana Goga, Giridhari Venkatadri, Krishna P. Gummadi:
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks. 141-153 - Raúl Gracia Tinedo, Yongchao Tian, Josep Sampé, Hamza Harkous, John Lenton, Pedro García López, Marc Sánchez Artigas, Marko Vukolic:
Dissecting UbuntuOne: Autopsy of a Global-scale Personal Cloud Back-end. 155-168 - Rui Miao, Rahul Potharaju, Minlan Yu, Navendu Jain:
The Dark Menace: Characterizing Network-based Attacks in the Cloud. 169-182
Trust & Security
- Yabing Liu, Will Tome, Liang Zhang, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Aaron Schulman, Christo Wilson:
An End-to-End Measurement of Certificate Revocation in the Web's PKI. 183-196 - Kensuke Fukuda, John S. Heidemann:
Detecting Malicious Activity with DNS Backscatter. 197-210 - Dapeng Liu, Youjian Zhao, Haowen Xu, Yongqian Sun, Dan Pei, Jiao Luo, Xiaowei Jing, Mei Feng:
Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning. 211-224
Mobile
- Huandong Wang, Fengli Xu, Yong Li, Pengyu Zhang, Depeng Jin:
Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment. 225-238 - Arash Molavi Kakhki, Abbas Razaghpanah, Anke Li, Hyungjoon Koo, Rajesh Golani, David R. Choffnes, Phillipa Gill, Alan Mislove:
Identifying Traffic Differentiation in Mobile Networks. 239-251 - Kensuke Fukuda, Hirochika Asai, Kenichi Nagami:
Tracking the Evolution and Diversity in Network Usage of Smartphones. 253-266 - Piotr Sapiezynski, Radu Gatej, Alan Mislove, Sune Lehmann:
Opportunities and Challenges in Crowdsourced Wardriving. 267-273
Measurement and/or Platforms
- Paul Emmerich, Sebastian Gallenmüller, Daniel Raumer, Florian Wohlfart, Georg Carle:
MoonGen: A Scriptable High-Speed Packet Generator. 275-287 - Frank Cangialosi, Dave Levin, Neil Spring:
Ting: Measuring and Exploiting Latencies Between All Tor Nodes. 289-302 - Ramakrishna Padmanabhan, Patrick Owen, Aaron Schulman, Neil Spring:
Timeouts: Beware Surprisingly High Delay. 303-316
WiFi and Mobile
- Xueheng Hu, Lixing Song, Dirk Van Bruggen, Aaron Striegel:
Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput. 317-323 - Christina Vlachou, Sébastien Henri, Patrick Thiran:
Electri-Fi Your Data: Measuring and Combining Power-Line Communications with WiFi. 325-338 - Sanae Rosen, Ashkan Nikravesh, Yihua Guo, Zhuoqing Morley Mao, Feng Qian, Subhabrata Sen:
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild. 339-345 - Sehyun Bae, Daehyun Ban, Dahyeon Han, Jiyoung Kim, Kyu-haeng Lee, Sangsoon Lim, Woojin Park, Chong-kwon Kim:
StreetSense: Effect of Bus Wi-Fi APs on Pedestrian Smartphone. 347-353
What's in a Name?
- Marc Kührer, Thomas Hupperich, Jonas Bushart, Christian Rossow, Thorsten Holz:
Going Wild: Large-Scale Classification of Open DNS Resolvers. 355-368 - Suqi Liu, Ian D. Foster, Stefan Savage, Geoffrey M. Voelker, Lawrence K. Saul:
Who is .com?: Learning to Parse WHOIS Records. 369-380 - Tristan Halvorson, Matthew F. Der, Ian D. Foster, Stefan Savage, Lawrence K. Saul, Geoffrey M. Voelker:
From .academy to .zone: An Analysis of the New TLD Land Rush. 381-394
Measurement and/or Platforms Deux
- Aaron Gember-Jacobson, Wenfei Wu, Xiujun Li, Aditya Akella, Ratul Mahajan:
Management Plane Analytics. 395-408 - Wenfei Wu, Keqiang He, Aditya Akella:
PerfSight: Performance Diagnosis for Software Dataplanes. 409-421 - Karyn Benson, Alberto Dainotti, kc claffy, Alex C. Snoeren, Michael G. Kallitsis:
Leveraging Internet Background Radiation for Opportunistic Network Analysis. 423-436 - Thomas Holterbach, Cristel Pelsser, Randy Bush, Laurent Vanbever:
Quantifying Interference between Measurements on the RIPE Atlas Platform. 437-443
China and Cuba
- Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, Vern Paxson:
Examining How the Great Firewall Discovers Hidden Circumvention Servers. 445-458 - Huoran Li, Xuan Lu, Xuanzhe Liu, Tao Xie, Kaigui Bian, Felix Xiaozhu Lin, Qiaozhu Mei, Feng Feng:
Characterizing Smartphone Usage Patterns from Millions of Android Users. 459-472 - Zhenhua Li, Christo Wilson, Tianyin Xu, Yao Liu, Zhen Lu, Yinlong Wang:
Offline Downloading in China: A Comparative Study. 473-486 - Zachary S. Bischof, John P. Rula, Fabián E. Bustamante:
In and Out of Cuba: Characterizing Cuba's Connectivity. 487-493
Analyses
- Le Chen, Alan Mislove, Christo Wilson:
Peeking Beneath the Hood of Uber. 495-508 - David Plonka, Arthur W. Berger:
Temporal and Spatial Classification of Active IPv6 Addresses. 509-522 - Yi-Ching Chiu, Brandon Schlinker, Abhishek Balaji Radhakrishnan, Ethan Katz-Bassett, Ramesh Govindan:
Are We One Hop Away from a Better Internet? 523-529 - Matt Calder, Ashley Flavel, Ethan Katz-Bassett, Ratul Mahajan, Jitendra Padhye:
Analyzing the Performance of an Anycast CDN. 531-537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.