default search action
IMC 2016: Santa Monica, CA, USA
- Phillipa Gill, John S. Heidemann, John W. Byers, Ramesh Govindan:
Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, November 14-16, 2016. ACM 2016, ISBN 978-1-4503-4526-2
Online Social Networks
- Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng:
Network Growth and Link Prediction Through an Empirical Lens. 1-15 - Muhammad Ahmad Bashir, Sajjad Arshad, Christo Wilson:
"Recommended For You": A First Look at Content Recommendation Networks. 17-24 - Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian:
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. 25-31
Security (Part 1)
- Drew Springall, Zakir Durumeric, J. Alex Halderman:
Measuring the Security Harm of TLS Crypto Shortcuts. 33-47 - Marcella Hastings, Joshua Fried, Nadia Heninger:
Weak Keys Remain Widespread in Network Devices. 49-63 - Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini:
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild. 65-79
Applications, Web and Users
- Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala:
Condensing Steam: Distilling the Diversity of Gamer Behavior. 81-95 - Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich:
Browser Feature Usage on the Modern Web. 97-110 - Andrew J. Kaizer, Minaxi Gupta:
Characterizing Website Behaviors Across Logged-in and Not-logged-in Users. 111-117 - Matthew Malloy, Mark McNamara, Aaron Cahn, Paul Barford:
Ad Blockers: Global Prevalence and Impact. 119-125 - Rijurekha Sen, Hasnain Ali Pirzada, Amreesh Phokeer, Zaid Ahmed Farooq, Satadal Sengupta, David R. Choffnes, Krishna P. Gummadi:
On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service. 127-133
Addressing
- Philipp Richter, Georgios Smaragdakis, David Plonka, Arthur W. Berger:
Beyond Counting: New Perspectives on the Active IPv4 Address Space. 135-149 - Youndo Lee, Neil Spring:
Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit. 151-165 - Pawel Foremski, David Plonka, Arthur W. Berger:
Entropy/IP: Uncovering Structure in IPv6 Addresses. 167-181 - Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, kc claffy, Neil Spring:
Reasons Dynamic Addresses Change. 183-198
Middleboxes
- Taejoong Chung, David R. Choffnes, Alan Mislove:
Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet. 199-213 - Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson:
A Multi-perspective Analysis of Carrier-Grade NAT Deployment. 215-229 - Shane Alcock, Jean-Pierre Möller, Richard Nelson:
Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports. 231-237 - Fangfan Li, Arash Molavi Kakhki, David R. Choffnes, Phillipa Gill, Alan Mislove:
Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules. 239-245
DNS
- Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda:
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. 247-253 - Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman:
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. 255-270 - Maciej Korczynski, Michal Król, Michel van Eeten:
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates. 271-278 - Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras:
Measuring the Adoption of DDoS Protection Services. 279-285
Mobile
- Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste:
An Empirical Analysis of a Large-scale Mobile Cloud Storage Service. 287-301 - Yihua Guo, Feng Qian, Qi Alfred Chen, Zhuoqing Morley Mao, Subhabrata Sen:
Understanding On-device Bufferbloat for Cellular Upload. 303-317 - Sohaib Ahmad, Abdul Lateef Haamid, Zafar Ayyub Qazi, Zhenyu Zhou, Theophilus Benson, Ihsan Ayyub Qazi:
A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World. 319-325 - Peter Membrey, Darryl Veitch, Rocky K. C. Chang:
Time to Measure the Pi. 327-334 - Sathiya Kumaran Mani, Ramakrishnan Durairajan, Paul Barford, Joel Sommers:
MNTP: Enhancing Time Synchronization for Mobile Devices. 335-348
Privacy
- Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson:
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. 349-364 - Christophe Leung, Jingjing Ren, David R. Choffnes, Christo Wilson:
Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services. 365-372 - Roberto Gonzalez, Claudio Soriente, Nikolaos Laoutaris:
User Profiling in the Time of HTTPS. 373-379
Topology Discovery
- Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, David D. Clark, kc claffy:
bdrmap: Inference of Borders Between IP Networks. 381-396 - Alexander Marder, Jonathan M. Smith:
MAP-IT: Multipass Accurate Passive Inferences from Traceroute. 397-411 - Robert Beverly:
Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery. 413-420 - Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth:
Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection. 421-427
Routing and Traffic Engineering
- Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti:
BGPStream: A Software Framework for Live and Historical BGP Data Analysis. 429-444 - Giovanni Comarela, Evimaria Terzi, Mark Crovella:
Detecting Unusually-Routed ASes: Methods and Applications. 445-459 - Monia Ghobadi, Ratul Mahajan:
Optical Layer Failures in a Large Backbone. 461-467 - Thomas Krenc, Anja Feldmann:
BGP Prefix Delegations: A Deep Dive. 469-475
Video
- Matti Siekkinen, Enrico Masala, Teemu Kämäräinen:
A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope. 477-483 - Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao:
Anatomy of a Personalized Livestreaming System. 485-498 - Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford:
Performance Characterization of a Commercial Video Streaming Service. 499-511 - Giorgos Dimopoulos, Ilias Leontiadis, Pere Barlet-Ros, Konstantina Papagiannaki:
Measuring Video QoE from Encrypted Traffic. 513-526
Security (Part 2)
- Taejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson:
Measuring and Applying Invalid SSL Certificates: The Silent Majority. 527-541 - Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
Towards a Complete View of the Certificate Ecosystem. 543-549 - Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? 551-557
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.