05478nam 22006855 450 99620517740331620200630222028.03-319-04918-610.1007/978-3-319-04918-2(CKB)3710000000089158(DE-He213)978-3-319-04918-2(SSID)ssj0001187413(PQKBManifestationID)11642139(PQKBTitleCode)TC0001187413(PQKBWorkID)11257323(PQKB)11650801(MiAaPQ)EBC3101232(PPN)176751793(EXLCZ)99371000000008915820140228d2014 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierPassive and Active Measurement[electronic resource] 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings /edited by Michalis Faloutsos, Aleksandar Kuzmanovic1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (XII, 282 p. 118 illus.) Computer Communication Networks and Telecommunications ;8362Bibliographic Level Mode of Issuance: Monograph3-319-04917-8 Includes bibliographical references and author index.Radio Prophet: Intelligent Radio Resource Deallocation for Cellular Networks -- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis -- Diagnosing Path Inflation of Mobile Client Traffic -- An End-to-End Measurement Study of Modern Cellular Data Networks -- A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option -- Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping -- On Searching for Patterns in Traceroute Responses -- Volume-Based Transit Pricing: Is 95 the Right Percentile? -- Dissecting Round Trip Time on the Slow Path with a Single Packet -- Is Our Ground-Truth for Traffic Classification Reliable? -- Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels -- The Need for End-to-End Evaluation of Cloud Availability -- Exposing Inconsistent Web Search Results with Bobble -- Modern Application Layer Transmission Patterns from a Transport Perspective -- Third-Party Identity Management Usage on the Web -- Understanding the Reachability of IPv6 Limited Visibility Prefixes -- Violation of Inter domain Routing Assumptions -- Here Be Web Proxies -- Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations -- Peering at the Internet’s Frontier: A First Look at ISP Interconnectivity in Africa -- Assessing DNS Vulnerability to Record Injection -- How Vulnerable Are Unprotected Machines on the Internet? -- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? -- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records -- Scaling Bandwidth Estimation to High Speed Networks -- Scalable Accurate Consolidation of Passively Measured Statistical Data -- A Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous Data Sources -- Nightlights: Entropy-Based Metrics for Classifying Dark space Traffic Patterns -- Distributed Active Measurement of Internet Queuing Delays.This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included.Computer Communication Networks and Telecommunications ;8362Computer system failuresComputer communication systemsComputer securitySystem Performance and Evaluationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13049Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Conference proceedings.fastComputer system failures.Computer communication systems.Computer security.System Performance and Evaluation.Computer Communication Networks.Systems and Data Security.005.1/4Faloutsos Michalisedthttp://id.loc.gov/vocabulary/relators/edtKuzmanovic Aleksandaredthttp://id.loc.gov/vocabulary/relators/edtPAM (Conference)MiAaPQMiAaPQMiAaPQBOOK996205177403316Passive and active measurement1891823UNISA