LEADER 05002nam 22006975 450 001 9910483899903321 005 20200703131358.0 010 $a3-319-15509-1 024 7 $a10.1007/978-3-319-15509-8 035 $a(CKB)3710000000379602 035 $a(SSID)ssj0001465649 035 $a(PQKBManifestationID)11755389 035 $a(PQKBTitleCode)TC0001465649 035 $a(PQKBWorkID)11477854 035 $a(PQKB)10366611 035 $a(DE-He213)978-3-319-15509-8 035 $a(MiAaPQ)EBC5595105 035 $a(PPN)184894697 035 $a(EXLCZ)993710000000379602 100 $a20150303d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPassive and Active Measurement $e16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings /$fedited by Jelena Mirkovic, Yong Liu 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XI, 374 p. 151 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v8995 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-15508-3 327 $aOpen Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers -- Characterizing Optimal DNS Amplification Attacks and Effective Mitigation -- Measuring BGP Route Origin Registration and Validation -- On the Diversity of Interdomain Routing in Africa -- AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic -- Uncovering the Footprints of Malicious Traffic in Cellular Data Networks -- Characterizing Instant Messaging Apps on Smartphones -- Do Mobile Data Plans Affect Usage? Results from a Pricing Trial with ISP Customers -- IPv6 AS Relationships, Cliques, and Congruence -- Measuring and Characterizing IPv6 Router Availability -- UAv6: Alias Resolution in IPv6 Using Unused Addresses -- Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure Via Active Fingerprinting -- On the Power and Limitations of Detecting Network Filtering via Passive Observation -- Distilling the Internet?s Application Mix from Packet-Sampled Traffic -- Enabling Internet-Wide Deployment of Explicit Congestion Notification -- Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List -- Transparent Estimation of Internet Penetration from Network Observations -- A Quantitative Study of Video Duplicate Levels in YouTube -- Measuring YouTube from Dual-Stacked Hosts -- Investigating Transparent Web Proxies in Cellular Networks -- TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers -- Exploring Miner Evolution in Bitcoin Network -- Measuring the Performance of User Traffic in Home Wireless Networks -- Enabling Wireless LAN Troubleshooting -- Improving the Packet Send-Time Accuracy in Embedded Devices -- What You Need to Know About SDN Flow Tables -- Software-Defined Latency Monitoring in Data Center Networks. 330 $aThis book constitutes the refereed proceedings of the 16th International Conference on Passive and Active Measurement, PAM 2015, held in New York, NY, USA, in March 2015. The 27 full papers presented were carefully reviewed and selected from 100 submissions. The papers have been organized in the following topical sections: DNS and Routing, Mobile and Cellular, IPv6, Internet-Wide, Web and Peer-to-Peer, Wireless and Embedded, and Software Defined Networking. 410 0$aComputer Communication Networks and Telecommunications ;$v8995 606 $aComputer system failures 606 $aComputer communication systems 606 $aComputer security 606 $aApplication software 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer system failures. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aApplication software. 615 14$aSystem Performance and Evaluation. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004.24 702 $aMirkovic$b Jelena$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Yong$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483899903321 996 $aPassive and Active Measurement$92810597 997 $aUNINA