Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
MAP-IT: Multipass Accurate Passive Inferences from Traceroute Alexander Marder, Jonathan M. Smith |
MAP-IT: Multipass Accurate Passive Inferences from Traceroute Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reasons Dynamic Addresses Change Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, kc claffy, Neil Spring |
Reasons Dynamic Addresses Change Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Weak Keys Remain Widespread in Network Devices Marcella Hastings, Joshua Fried, Nadia Heninger |
Weak Keys Remain Widespread in Network Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit Youndo Lee, Neil Spring |
Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Measuring the Adoption of DDoS Protection Services Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras |
Measuring the Adoption of DDoS Protection Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery Robert Beverly |
Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
"Recommended For You": A First Look at Content Recommendation Networks Muhammad Ahmad Bashir, Sajjad Arshad, Christo Wilson |
"Recommended For You": A First Look at Content Recommendation Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda |
WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Peter Membrey, Darryl Veitch, Rocky K. C. Chang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring and Applying Invalid SSL Certificates: The Silent Majority Taejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson |
Measuring and Applying Invalid SSL Certificates: The Silent Majority Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Ad Blockers: Global Prevalence and Impact Matthew Malloy, Mark McNamara, Aaron Cahn, Paul Barford |
Ad Blockers: Global Prevalence and Impact Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a Complete View of the Certificate Ecosystem Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael Bailey, J. Alex Halderman |
Towards a Complete View of the Certificate Ecosystem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet Taejoong Chung, David R. Choffnes, Alan Mislove |
Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World Sohaib Ahmad, Abdul Lateef Haamid, Zafar Ayyub Qazi, Zhenyu Zhou, Theophilus Benson, Ihsan Ayyub Qazi |
A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Multi-perspective Analysis of Carrier-Grade NAT Deployment Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson |
A Multi-perspective Analysis of Carrier-Grade NAT Deployment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BGPStream: A Software Framework for Live and Historical BGP Data Analysis Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti |
BGPStream: A Software Framework for Live and Historical BGP Data Analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian |
You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optical Layer Failures in a Large Backbone Monia Ghobadi, Ratul Mahajan |
Optical Layer Failures in a Large Backbone Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rijurekha Sen, Hasnain Ali Pirzada, Amreesh Phokeer, Zaid Ahmed Farooq, Satadal Sengupta, David R. Choffnes, Krishna P. Gummadi |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini |
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Detecting Unusually-Routed ASes: Methods and Applications Giovanni Comarela, Evimaria Terzi, Mark Crovella |
Detecting Unusually-Routed ASes: Methods and Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Network Growth and Link Prediction Through an Empirical Lens Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng |
Network Growth and Link Prediction Through an Empirical Lens Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports Shane Alcock, Jean-Pierre Möller, Richard Nelson |
Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring the Security Harm of TLS Crypto Shortcuts Drew Springall, Zakir Durumeric, J. Alex Halderman |
Measuring the Security Harm of TLS Crypto Shortcuts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BGP Prefix Delegations: A Deep Dive Thomas Krenc, Anja Feldmann |
BGP Prefix Delegations: A Deep Dive Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MNTP: Enhancing Time Synchronization for Mobile Devices Sathiya Kumaran Mani, Ramakrishnan Durairajan, Paul Barford, Joel Sommers |
MNTP: Enhancing Time Synchronization for Mobile Devices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Browser Feature Usage on the Modern Web Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich |
Browser Feature Usage on the Modern Web Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope Matti Siekkinen, Enrico Masala, Teemu Kämäräinen |
A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anatomy of a Personalized Livestreaming System Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao |
Anatomy of a Personalized Livestreaming System Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson |
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Characterizing Website Behaviors Across Logged-in and Not-logged-in Users Andrew J. Kaizer, Minaxi Gupta |
Characterizing Website Behaviors Across Logged-in and Not-logged-in Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Performance Characterization of a Commercial Video Streaming Service Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford |
Performance Characterization of a Commercial Video Streaming Service Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Measuring Video QoE from Encrypted Traffic Giorgos Dimopoulos, Ilias Leontiadis, Pere Barlet-Ros, Konstantina Papagiannaki |
Measuring Video QoE from Encrypted Traffic Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates Maciej Korczynski, Michal Król, Michel van Eeten |
Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman |
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
bdrmap: Inference of Borders Between IP Networks Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, David D. Clark, kc claffy |
bdrmap: Inference of Borders Between IP Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beyond Counting: New Perspectives on the Active IPv4 Address Space Philipp Richter, Georgios Smaragdakis, David Plonka, Arthur W. Berger |
Beyond Counting: New Perspectives on the Active IPv4 Address Space Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Condensing Steam: Distilling the Diversity of Gamer Behavior Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala |
Condensing Steam: Distilling the Diversity of Gamer Behavior Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Christophe Leung, Jingjing Ren, David R. Choffnes, Christo Wilson |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Understanding On-device Bufferbloat for Cellular Upload Yihua Guo, Feng Qian, Qi Alfred Chen, Zhuoqing Morley Mao, Subhabrata Sen |
Understanding On-device Bufferbloat for Cellular Upload Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules Fangfan Li, Arash Molavi Kakhki, David R. Choffnes, Phillipa Gill, Alan Mislove |
Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
User Profiling in the Time of HTTPS Roberto Gonzalez, Claudio Soriente, Nikolaos Laoutaris |
User Profiling in the Time of HTTPS Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Analysis of a Large-scale Mobile Cloud Storage Service Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste |
An Empirical Analysis of a Large-scale Mobile Cloud Storage Service Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Entropy/IP: Uncovering Structure in IPv6 Addresses Pawel Foremski, David Plonka, Arthur W. Berger |
Entropy/IP: Uncovering Structure in IPv6 Addresses Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|