


default search action
IMC 2018: Boston, MA, USA
- Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. ACM 2018, ISBN 978-1-4503-5619-0

- Mallesham Dasari, Santiago Vargas, Arani Bhattacharya, Aruna Balasubramanian, Samir R. Das, Michael Ferdman:

Impact of Device Performance on Mobile Internet QoE. 1-7 - Giovane C. M. Moura, John S. Heidemann, Moritz Müller, Ricardo de Oliveira Schmidt, Marco Davids:

When the Dike Breaks: Dissecting DNS Defenses During DDoS. 8-21 - Piet De Vaere, Tobias Bühler, Mirja Kühlewind, Brian Trammell:

Three Bits Suffice: Explicit Support for Passive Measurement of Internet Latency in QUIC and TCP. 22-28 - Kevin Vermeulen, Stephen D. Strowes, Olivier Fourmaux, Timur Friedman:

Multilevel MDA-Lite Paris Traceroute. 29-42 - Louis F. DeKoven, Trevor Pottinger, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis:

Following Their Footsteps: Characterizing Account Automation Abuse and Defenses. 43-55 - Alexander Marder, Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, K. C. Claffy, Jonathan M. Smith:

Pushing the Boundaries with bdrmapIT: Mapping Router Ownership at Internet Scale. 56-69 - Jan Rüth, Torsten Zimmermann, Konrad Wolsing, Oliver Hohlfeld:

Digging into Browser-based Crypto Mining. 70-76 - Harini Kolamunna, Ilias Leontiadis, Diego Perino, Suranga Seneviratne, Kanchana Thilakarathna, Aruna Seneviratne:

A First Look at SIM-Enabled Wearables in the Wild. 77-83 - Mark Allman:

Comments on DNS Robustness. 84-90 - Seoung Kyun Kim, Zane Ma, Siddharth Murali, Joshua Mason, Andrew Miller, Michael D. Bailey:

Measuring Ethereum Network Peers. 91-104 - Taejoong Chung, Jay Lok, Balakrishnan Chandrasekaran, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, John P. Rula, Nick Sullivan, Christo Wilson:

Is the Web Ready for OCSP Must-Staple? 105-118 - Liang Zhu, John S. Heidemann:

LDplayer: DNS Experimentation at Scale. 119-132 - Armin Sarabi, Mingyan Liu:

Characterizing the Internet Host Population Using Deep Learning: A Universal and Lightweight Numerical Embedding. 133-146 - Haotian Deng, Chunyi Peng, Ans Fida, Jiayi Meng, Y. Charlie Hu:

Mobility Support in Cellular Networks: A Measurement Study on Its Configurations and Implications. 147-160 - Zhijing Li, Zihui Ge, Ajay Mahimkar, Jia Wang, Ben Y. Zhao, Haitao Zheng, Joanne Emmons, Laura Ogden:

Predictive Analysis in Network Function Virtualization. 161-167 - Rachee Singh, Arun Dunna, Phillipa Gill:

Characterizing the Deployment and Performance of Multi-CDNs. 168-174 - Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, Micah Sherr:

Understanding Tor Usage with Privacy-Preserving Measurement. 175-187 - Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil:

On the Origins of Memes by Means of Fringe Web Communities. 188-202 - Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, Phillipa Gill:

How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation. 203-217 - Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi:

403 Forbidden: A Global View of CDN Geoblocking. 218-230 - Kensuke Fukuda, John S. Heidemann:

Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning. 231-237 - Zahaib Akhtar, Yun Seong Nam, Jessica Chen, Ramesh Govindan, Ethan Katz-Bassett, Sanjay G. Rao, Jibin Zhan, Hui Zhang:

Understanding Video Management Planes. 238-251 - Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Kumar Sharma, Sambuddho Chakravarty:

Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. 252-264 - George Nomikos, Vasileios Kotronis, Pavlos Sermpezis, Petros Gigis, Lefteris Manassakis, Christoph Dietzel, Stavros Konstantaras, Xenofontas A. Dimitropoulos, Vasileios Giotsas:

O Peer, Where Art Thou?: Uncovering Remote Peering Interconnections at IXPs. 265-278 - Florian Streibelt, Franziska Lichtblau, Robert Beverly, Anja Feldmann

, Cristel Pelsser
, Georgios Smaragdakis, Randy Bush:
BGP Communities: Even more Worms in the Routing Can. 279-292 - Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. 293-307 - Robert Beverly, Ramakrishnan Durairajan, David Plonka, Justin P. Rohrer:

In the IP of the Beholder: Strategies for Active IPv6 Topology Discovery. 308-321 - Tobias Lauinger, Ahmet Salih Buyukkayhan, Abdelberi Chaabane, William K. Robertson, Engin Kirda:

From Deletion to Re-Registration in Zero Seconds: Domain Registrar Behaviour During the Drop. 322-328 - Costas Iordanou, Georgios Smaragdakis, Ingmar Poese, Nikolaos Laoutaris:

Tracing Cross Border Web Tracking. 329-342 - Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, Matthias Wählisch:

The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. 343-349 - Philipp Richter, Ramakrishna Padmanabhan, Neil Spring, Arthur W. Berger, David D. Clark:

Advancing the Art of Internet Edge Outage Detection. 350-363 - Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle:

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. 364-378 - Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, Michalis Polychronakis:

An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. 379-392 - Justin Meza, Tianyin Xu, Kaushik Veeraraghavan, Onur Mutlu:

A Large Scale Study of Data Center Network Reliability. 393-407 - Jeremias Blendin, Fabrice Bendfeldt, Ingmar Poese, Boris Koldehofe, Oliver Hohlfeld:

Dissecting Apple's Meta-CDN during an iOS Update. 408-414 - Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez, Juan Caballero:

Coming of Age: A Longitudinal Study of TLS Deployment. 415-428 - Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:

Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. 429-442 - Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, Narseo Vallina-Rodriguez:

An Empirical Analysis of the Commercial VPN Ecosystem. 443-456 - Mattijs Jonker, Aiko Pras, Alberto Dainotti, Anna Sperotto:

A First Joint Look at DoS Attacks and BGP Blackholing in the Wild. 457-463 - Arjun Roy, Deepak Bansal, David Brumley, Harish Kumar Chandrappa, Parag Sharma, Rishabh Tewari, Behnaz Arzani, Alex C. Snoeren:

Cloud Datacenter SDN Monitoring: Experiences and Challenges. 464-470 - Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William K. Robertson, Christo Wilson:

How Tracking Companies Circumvented Ad Blockers Using WebSockets. 471-477 - Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, Narseo Vallina-Rodriguez:

A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. 478-493 - Lucianna Kiffer, Dave Levin, Alan Mislove:

Analyzing Ethereum's Contract Topology. 494-499

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














