Accepted Papers

Passive and Active Measurement – Springer Full accepted papers

Passive and Active Measurement

18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings

  1. Something From Nothing (There): Collecting Global IPv6 Datasets From DNS

          Authors: T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna

  1. Measuring What is Not Ours: A Tale of 3rd Party Performance

          Authors: U. Goel, M. Steiner, M. Wittie, M. Flack, S. Ludin

  1. Scope for HTTPs caching in wired and wireless networks

          Authors: P. Gupta, M. Patel, K. Chebrolu

  1. On the potential of IPv6 open resolvers for DDoS attacks

          Authors: L. Hendriks, R. Schmidt, R. van Rijswijk-Deij, A. Pras

  1. Anycast Latency: How Many Sites Are Enough?

          Authors: R. Schmidt, J. Heidemann, J. Kuipers

  1. Internet Scale User-Generated Live Video Streaming: The Twitch Case

          Authors: J. Deng, G. Tyson, F. Cuadrado, S. Uhlig

  1. Where Has My Time Gone?

           Authors: N. Zilberman, M. Grosvenor, D. Popescu, N. Manihatty-Bojan, G. Antichi, M. Wojcik, A. Moore

  1. Understanding the Share of IPv6 Traffic in a Dual-stack ISP

          Authors: E. Pujol, P. Richter, A. Feldmann

  1. Mind The Gap Between HTTP and HTTPS in Mobile Networks

          Authors: A. Finamore, M. Varvello, K. Papagiannaki

  1. The web, the users, and the MOS: Influence of HTTP/2 on user experience

          Authors: E. Bocchi, L. De Cicco, M. Mellia, D. Rossi

  1. Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network

          Authors: E. Dimogerontakis, R. Meseguer, L. Navarro

  1. Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks

          Authors: D. Pariag, T. Brecht

  1. Where is the Weakest Link? A Study on Security Discrepancies between Android Apps and Their Website Counterparts

           Authors: A. Alavi, A. Quach, H. Zhang, B. Marsh, F. Haq, Z. Qian, L. Lu, R. Gupta

  1. Using Loops Observed in Traceroute to Infer Ability to Spoof

           Authors: Q. Lone, M. Luckie, M. Korczyński, M. van Eeten

  1. A First Look at the CT Landscape: Certificate Transparency Logs in Practice

          Authors: J. Gustafsson, G. Overier, M. Arlitt, N. Carlsson

  1. Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State

          Authors: A. Sarabi, Z. Zhu, C. Xiao, M. Liu, T. Dumitras

  1. A Characterization of Load Balancing on the IPv6 Internet

          Authors: R. Almeida, O. Fonseca, E. Fazzion, D. Guedes, W. Meira Jr., I. Cunha

  1. Why is the Internet so slow?

           Authors: I. Bozkurt, B. Chandrasekaran, A. Aguirre, P. Godfrey, G. Laughlin, B. Maggs, A. Singla

  1. Enhancing WiFi Throughput With PLC Extenders: A Measurement Study

           Authors: K. Apicharttrisorn, A. Atya, J. Chen, K. Sundaresan, S. Krishnamurthy

  1. The utility argument — Making a case for broadband SLAs

          Authors: Z. Bischof, F. Bustamante, R. Stanojevic