Passive and Active Measurement 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings /

This book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM 2015, held in New York, NY, USA, in March 2015. The 27 full papers presented were carefully reviewed and selected from 100 submissions. The papers have been organized in the fol...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Mirkovic, Jelena (Επιμελητής έκδοσης), Liu, Yong (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2015.
Σειρά:Lecture Notes in Computer Science, 8995
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers
  • Characterizing Optimal DNS Amplification Attacks and Effective Mitigation
  • Measuring BGP Route Origin Registration and Validation
  • On the Diversity of Interdomain Routing in Africa
  • AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic
  • Uncovering the Footprints of Malicious Traffic in Cellular Data Networks
  • Characterizing Instant Messaging Apps on Smartphones
  • Do Mobile Data Plans Affect Usage? Results from a Pricing Trial with ISP Customers
  • IPv6 AS Relationships, Cliques, and Congruence
  • Measuring and Characterizing IPv6 Router Availability
  • UAv6: Alias Resolution in IPv6 Using Unused Addresses
  • Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure Via Active Fingerprinting
  • On the Power and Limitations of Detecting Network Filtering via Passive Observation
  • Distilling the Internet’s Application Mix from Packet-Sampled Traffic
  • Enabling Internet-Wide Deployment of Explicit Congestion Notification
  • Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List
  • Transparent Estimation of Internet Penetration from Network Observations
  • A Quantitative Study of Video Duplicate Levels in YouTube
  • Measuring YouTube from Dual-Stacked Hosts
  • Investigating Transparent Web Proxies in Cellular Networks
  • TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers
  • Exploring Miner Evolution in Bitcoin Network
  • Measuring the Performance of User Traffic in Home Wireless Networks
  • Enabling Wireless LAN Troubleshooting
  • Improving the Packet Send-Time Accuracy in Embedded Devices
  • What You Need to Know About SDN Flow Tables
  • Software-Defined Latency Monitoring in Data Center Networks.