Discovering the IPv6 Network Periphery
|
2020 |
Rye, Erik C. |
Dissecting the Workload of a and Major Adult Video Portal
|
2020 |
Grammenos, Andreas |
Understanding Video Streaming Algorithms in the Wild
|
2020 |
Licciardello, Melissa |
Untangling Header Bidding Lore: Some Myths, Some Truths, and Some Hope
|
2020 |
Aqeel, Waqar |
To Filter or Not to Filter: Measuring the Benefits of Registering in the RPKI Today
|
2020 |
Testart, Cecilia |
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
|
2020 |
Korczyński, Maciej |
Alias Resolution Based on ICMP Rate Limiting
|
2020 |
Vermeulen, Kevin |
Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China
|
2020 |
Wang, Zhaohua |
FLowTRAcE : A Framework for Active Bandwidth Measurements Using In-band Packet Trains
|
2020 |
Ahmed, Adnan |
Leopard: Understanding the Threat of Blockchain Domain Name Based Malware
|
2020 |
Huang, Zhangrong |
MUST, SHOULD, DON'T CARE: TCP Conformance in the Wild
|
2020 |
Kosek, Mike |
When Parents and Children Disagree: Diving into DNS Delegation Inconsistency
|
2020 |
Sommese, Raffaele |
Counterfighting Counterfeit: Detecting and Taking down Fraudulent Thymen and Cristian Hesselman Webshops at a ccTLD
|
2020 |
Wabeke, Thymen |
Improving Coverage of Internet Outage Detection in Sparse Block
|
2020 |
Baltra, Guillermo |
A First Look at the Misuse and Abuse of the IPv4 Transfer Market
|
2020 |
Giotsas, Vasileios |
Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN’s gTLD Experiments
|
2020 |
Pouryousef, Shahrooz |
Unintended Consequences: Effects of Submarine Cable Deployment on Intemet Routing
|
2020 |
Fanou, Rodérick |
A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet
|
2020 |
Yeganeh, Bahador |
APPLE: Alias Pruning by Path Length Estimation
|
2020 |
Marder, Alexander |