LEADER 05453nam 22006855 450 001 9910485018303321 005 20200630222028.0 010 $a3-319-04918-6 024 7 $a10.1007/978-3-319-04918-2 035 $a(CKB)3710000000089158 035 $a(DE-He213)978-3-319-04918-2 035 $a(SSID)ssj0001187413 035 $a(PQKBManifestationID)11642139 035 $a(PQKBTitleCode)TC0001187413 035 $a(PQKBWorkID)11257323 035 $a(PQKB)11650801 035 $a(MiAaPQ)EBC3101232 035 $a(PPN)176751793 035 $a(EXLCZ)993710000000089158 100 $a20140228d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPassive and Active Measurement $e15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings /$fedited by Michalis Faloutsos, Aleksandar Kuzmanovic 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 282 p. 118 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v8362 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-04917-8 320 $aIncludes bibliographical references and author index. 327 $aRadio Prophet: Intelligent Radio Resource Deallocation for Cellular Networks -- Mobile Network Performance from User Devices: A Longitudinal, Multidimensional Analysis -- Diagnosing Path Inflation of Mobile Client Traffic -- An End-to-End Measurement Study of Modern Cellular Data Networks -- A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option -- Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping -- On Searching for Patterns in Traceroute Responses -- Volume-Based Transit Pricing: Is 95 the Right Percentile? -- Dissecting Round Trip Time on the Slow Path with a Single Packet -- Is Our Ground-Truth for Traffic Classification Reliable? -- Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels -- The Need for End-to-End Evaluation of Cloud Availability -- Exposing Inconsistent Web Search Results with Bobble -- Modern Application Layer Transmission Patterns from a Transport Perspective -- Third-Party Identity Management Usage on the Web -- Understanding the Reachability of IPv6 Limited Visibility Prefixes -- Violation of Inter domain Routing Assumptions -- Here Be Web Proxies -- Towards an Automated Investigation of the Impact of BGP Routing Changes on Network Delay Variations -- Peering at the Internet?s Frontier: A First Look at ISP Interconnectivity in Africa -- Assessing DNS Vulnerability to Record Injection -- How Vulnerable Are Unprotected Machines on the Internet? -- A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? -- On the Effectiveness of Traffic Analysis against Anonymity Networks Using Flow Records -- Scaling Bandwidth Estimation to High Speed Networks -- Scalable Accurate Consolidation of Passively Measured Statistical Data -- A Needle in the Haystack - Delay Based User Identification in Cellular Networks -- Understanding HTTP Traffic and CDN Behavior from the Eyes of a Mobile ISP -- On Understanding User Interests through Heterogeneous Data Sources -- Nightlights: Entropy-Based Metrics for Classifying Dark space Traffic Patterns -- Distributed Active Measurement of Internet Queuing Delays. 330 $aThis book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement, PAM 2014, held in Los Angeles, CA, USA, in 2014. The 24 revised full papers presented were carefully reviewed and selected from 76 submissions. The papers have been organized in the following topical sections: internet wireless and mobility; measurement design, experience and analysis; performance measurement; protocol and application behavior; characterization of network behavior; and network security and privacy. In addition 7 poster papers have been included. 410 0$aComputer Communication Networks and Telecommunications ;$v8362 606 $aComputer system failures 606 $aComputer communication systems 606 $aComputer security 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 608 $aConference proceedings.$2fast 615 0$aComputer system failures. 615 0$aComputer communication systems. 615 0$aComputer security. 615 14$aSystem Performance and Evaluation. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 676 $a005.1/4 702 $aFaloutsos$b Michalis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKuzmanovic$b Aleksandar$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aPAM (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485018303321 996 $aPassive and Active Measurement$92810597 997 $aUNINA