LEADER 05351nam 22007455 450 001 996418221103316 005 20200704013538.0 010 $a3-030-44081-8 024 7 $a10.1007/978-3-030-44081-7 035 $a(CKB)4100000010770680 035 $a(DE-He213)978-3-030-44081-7 035 $a(MiAaPQ)EBC6141920 035 $a(PPN)243222882 035 $a(EXLCZ)994100000010770680 100 $a20200317d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPassive and Active Measurement$b[electronic resource] $e21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30?31, 2020, Proceedings /$fedited by Anna Sperotto, Alberto Dainotti, Burkhard Stiller 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XIII, 330 p. 157 illus., 121 illus. in color.) 225 1 $aComputer Communication Networks and Telecommunications ;$v12048 311 $a3-030-44080-X 320 $aIncludes bibliographical references and index. 327 $aActive Measurement -- Discovering the IPv6 Network Periphery -- Improving Coverage of Internet Outage Detection in Sparse Blocks -- FlowTrace: A Framework for Active Bandwidth Measurements using In-band Packet Trains -- Security -- Leopard: Understanding the Threat of Blockchain Domain Name Based Malware -- To Filter or not to Filter: Measuring the Benefits of Registering in the RPKI Today -- A First Look in the Misuse and Abuse of the IPv4 Transfer Market -- Best Practices and Conformance -- Don?t Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation on Inbound Traffic -- MUST, SHOULD, DON?T CARE: TCP Conformance in the Wild -- Domain Names -- Extortion or Expansion? An Investigation Into the Costs and Consequences of ICANN's gTLD Experiments -- Counterfighting Counterfeit: Detecting and Taking Down Fraudulent Webshops at a ccTLD -- When Parents and Children Disagree: Diving Into DNS Delegation Inconsistency -- Topology and Routing -- A First Comparative Characterization of Multi-cloud Connectivity in Today's Internet -- Unintended Consequences: Effects of Submarine Cable Deployment on Internet Routing -- Topology: Alias Resolution -- Alias Resolution based on ICMP Rate Limiting -- APPLE: Alias Pruning by Path Length Estimation -- Web -- Dissecting the Workload of a Major Adult Video Portal -- Untangling Header Bidding Lore -- Understanding Video Streaming Algorithms in the Wild -- Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China. 330 $aThis book constitutes the proceedings of the 21st International Conference on Passive and Active Measurement, PAM 2020, which was planned to be held in Eugene, Oregon, USA, in March 2020. Due to the Corona pandemic, the conference was organized as a virtual meeting. The 19 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They were organized in topical sections named: active measurement; security; best practices and conformance; domain names; topology and routing; topology - alias resolution; and Web. . 410 0$aComputer Communication Networks and Telecommunications ;$v12048 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aArchitecture, Computer 606 $aApplication software 606 $aArtificial intelligence 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aComputer System Implementation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13057 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 0$aArchitecture, Computer. 615 0$aApplication software. 615 0$aArtificial intelligence. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aComputer System Implementation. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aArtificial Intelligence. 615 24$aSystems and Data Security. 676 $a004.6 702 $aSperotto$b Anna$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDainotti$b Alberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStiller$b Burkhard$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996418221103316 996 $aPassive and active measurement$91891823 997 $aUNISA