default search action
7th TMA 2015: Barcelona, Spain
- Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure:
Traffic Monitoring and Analysis - 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings. Lecture Notes in Computer Science 9053, Springer 2015, ISBN 978-3-319-17171-5
Measurement Tools and Methods
- Víctor Uceda, Miguel Rodríguez, Javier Ramos, José Luis García-Dorado, Javier Aracil:
Selective Capping of Packet Payloads for Network Analysis and Management. 3-16 - Ossi Karkulahti, Jussi Kangasharju:
Youtube Revisited: On the Importance of Correct Measurement Methodology. 17-30 - François Espinet, Diana Joumblatt, Dario Rossi:
Zen and the Art of Network Troubleshooting: A Hands on Experimental Study. 31-45
Mobile and Wireless
- Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas:
Vivisecting WhatsApp in Cellular Networks: Servers, Flows, and Quality of Experience. 49-63 - Peter Romirer-Maierhofer, Mirko Schiavone, Alessandro D'Alconzo:
Device-Specific Traffic Characterization for Root Cause Analysis in Cellular Networks. 64-78 - Valentin Thirion, Korian Edeline, Benoit Donnet:
Tracking Middleboxes in the Mobile World with TraceboxAndroid. 79-91
Web
- Xun Fan, Ethan Katz-Bassett, John S. Heidemann:
Assessing Affinity Between Users and CDN Sites. 95-110 - Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, Mario Baldi:
The Online Tracking Horde: A View from Passive Measurements. 111-125 - Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto:
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs. 126-139
Security
- Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, Muhammad Faheem Awan, Tahir Ahmad, Saad B. Qaisar:
Monitoring Internet Censorship with UBICA. 143-157 - Elias Raftopoulos, Eduard Glatz, Xenofontas A. Dimitropoulos, Alberto Dainotti:
How Dangerous Is Internet Scanning? - A Measurement Study of the Aftermath of an Internet-Wide Scan. 158-172 - Johann Schlamp, Ralph Holz, Oliver Gasser, Andreas Korsten, Quentin Jacquemart, Georg Carle, Ernst W. Biersack:
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks. 173-187 - Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas C. Schmidt, Georg Carle:
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire. 188-201
New Protocols
- Timm Böttger, Lothar Braun, Oliver Gasser, Felix von Eye, Helmut Reiser, Georg Carle:
DoS Amplification Attacks - Protocol-Agnostic Detection of Service Abuse in Amplifier Networks. 205-218 - Liang Zhu, Duane Wessels, Allison Mankin, John S. Heidemann:
Measuring DANE TLSA Deployment. 219-232 - Benjamin Hesmans, Hoang Tran-Viet, Ramin Sadre, Olivier Bonaventure:
A First Look at Real Multipath TCP Traffic. 233-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.