


default search action
26th PAM 2025: Virtual Event
- Cecilia Testart, Roland van Rijswijk-Deij

, Burkhard Stiller
:
Passive and Active Measurement - 26th International Conference, PAM 2025, Virtual Event, March 10-12, 2025, Proceedings. Lecture Notes in Computer Science 15567, Springer 2025, ISBN 978-3-031-85959-5
IPv6
- Justin Iurman

, Benoit Donnet
:
The Razor's Edge: IPv6 Extension Headers Survivability. 3-29 - Fengyuan Huang, Yifan Yang, Zhenzhong Yang, Bingnan Hou, Yingwen Chen, Zhiping Cai:

A Closer Look at IPv6 IP-ID Behavior in the Wild. 30-43 - Mert Erdemir, Frank Li, Paul Pearce:

Understanding IPv6 Aliases and Detection Methods. 44-73
Measurement Platforms
- Tzu-Bin Yan

, Zesen Zhang
, Bradley Huffaker, Ricky K. P. Mok, K. C. Claffy
, Kirill Levchenko
:
Marionette Measurement: Measurement Support Under the PacketLab Model. 77-105 - Florian Steurer

, Anja Feldmann
, Tobias Fiebig
:
A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration. 106-136 - Matthew Luckie, Shivani Hariprasad, Raffaele Sommese, Brendon Jones, Ken Keys, Ricky K. P. Mok, K. C. Claffy

:
An Integrated Active Measurement Programming Environment. 137-152
Web/HTTP
- Iliès Benhabbour

, Mahmoud Attia, Marc Dacier
:
HTTP Conformance vs. Middleboxes: Identifying Where the Rules Actually Break Down. 155-181 - Maximilian Zöllner, Anja Feldmann, Ha Dao:

A First Look at Cookies Having Independent Partitioned State. 182-196 - Mostafa Ansar, Anna Sperotto, Ralph Holz

:
Web Crawl Refusals: Insights From Common Crawl. 197-214
Connectivity
- Fatih Berkay Sarpkaya

, Fraida Fund
, Shivendra S. Panwar
:
To Adopt or Not to Adopt L4S-Compatible Congestion Control? Understanding Performance in a Partial L4S Deployment. 217-246 - Wenyi Morty Zhang, Zihan Xu, Sangeetha Abdu Jyothi:

A Deep Dive into LEO Satellite Topology Design Parameters. 247-275 - Leandro Marcio Bertholdo

, Renan Paredes Barreto
, Gabriela de Lima Marin, Cesar A. H. Loureiro, Milton Kaoru Kashiwakura, Pedro de Botelho Marcos
:
Analyzing the Effect of an Extreme Weather Event on Telecommunications and Information Technology: Insights from 30 Days of Flooding. 276-304
Routing
- Omar Darwich, Cristel Pelsser, Kevin Vermeulen:

Detecting Traffic Engineering from Public BGP Data. 307-334 - Henry Birge-Lee

, Maria Apostolaki
, Jennifer Rexford
:
Global BGP Attacks that Evade Route Monitoring. 335-357
Anycast
- Xiao Zhang, Shihan Lin, Tingshan Huang, Bruce M. Maggs, Kyle Schomp, Xiaowei Yang:

Characterizing Anycast Flipping: Prevalence and Impact. 361-388 - Remi Hendriks

, Bernhard Degen
, Bas Palinckx, Raffaele Sommese, Roland van Rijswijk-Deij
:
An Empirical Evaluation of Longitudinal Anycast Catchment Stability. 389-401
Phishing and Fraud
- Victor Le Pochat

, Cameron Ballard, Lieven Desmet
, Wouter Joosen
, Damon McCoy
, Tobias Lauinger
:
Partnërka in Crime: Characterizing Deceptive Affiliate Marketing Offers. 405-436 - Elisa Luo, Liane Young, Grant Ho, M. H. Afifi, Marco Schweighauser, Ethan Katz-Bassett, Asaf Cidon:

Characterizing the Networks Sending Enterprise Phishing Emails. 437-466
5G
- Fukun Chen, Moinak Ghoshal, Enfu Nan, Phuc Dinh, Imran Khan, Z. Jonny Kong, Y. Charlie Hu, Dimitrios Koutsonikolas:

A Large-Scale Study of the Potential of Multi-carrier Access in the 5G Era. 469-484 - Varshika Srinivasavaradhan, Jiayi Liu, Elizabeth M. Belding:

5G Performance: A Multidimensional Variability Analysis. 485-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














