Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering | 0 | 0.34 | 2022 |
PredictRoute: A Network Path Prediction Toolkit | 1 | 0.35 | 2021 |
How Great is the Great Firewall? Measuring China's DNS Censorship | 0 | 0.34 | 2021 |
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform | 0 | 0.34 | 2020 |
Assessing the Privacy Benefits of Domain Name Encryption | 2 | 0.41 | 2020 |
Triplet Censors - Demystifying Great Firewall's DNS Censorship Behavior. | 0 | 0.34 | 2020 |
BGP hijacking classification | 2 | 0.37 | 2019 |
A large-scale analysis of deployed traffic differentiation practices. | 2 | 0.45 | 2019 |
Information Market for Web Browsing: Design, Usability and Incremental Adoption. | 0 | 0.34 | 2018 |
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation. | 9 | 0.53 | 2018 |
Analyzing China's Blocking of Unpublished Tor Bridges. | 0 | 0.34 | 2018 |
Characterizing the Deployment and Performance of Multi-CDNs. | 2 | 0.36 | 2018 |
Characterizing the Nature and Dynamics of Tor Exit Blocking | 0 | 0.34 | 2018 |
Studying TLS Usage in Android Apps. | 8 | 0.48 | 2018 |
RADWAN: rate adaptive wide area network. | 9 | 0.56 | 2018 |
Run, Walk, Crawl: Towards Dynamic Link Capacities. | 5 | 0.47 | 2017 |
lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently. | 4 | 0.41 | 2017 |
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography. | 0 | 0.34 | 2017 |
Measuring Offensive Speech in Online Political Discourse. | 1 | 0.35 | 2017 |
PathCache: A Path Prediction Toolkit. | 2 | 0.37 | 2016 |
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design. | 2 | 0.38 | 2016 |
Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms | 8 | 0.47 | 2016 |
Measuring and mitigating AS-level adversaries against Tor | 9 | 0.50 | 2015 |
Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data | 13 | 0.64 | 2015 |
Internet Outages, The Eyewitness Accounts: Analysis Of The Outages Mailing List | 7 | 0.45 | 2015 |
A survey of interdomain routing policies | 34 | 1.08 | 2014 |
A First Look at Performance in Mobile Virtual Network Operators | 12 | 0.78 | 2014 |
Targeted threat index: characterizing and quantifying politically-motivated targeted malware | 15 | 0.80 | 2014 |
Characterizing large-scale routing anomalies: a case study of the china telecom incident | 16 | 0.71 | 2013 |
Best paper -- Follow the money: understanding economics of online aggregation and advertising | 26 | 0.96 | 2013 |
A method for identifying and confirming the use of URL filtering products for censorship | 8 | 0.56 | 2013 |
Modeling on quicksand: dealing with the scarcity of ground truth in interdomain routing data | 20 | 1.24 | 2012 |
A Socratic method for validation of measurement-based networking research | 11 | 0.66 | 2011 |
Short paper: a look at smartphone permission models | 24 | 2.63 | 2011 |
Characterizing Intelligence Gathering and Control on an Edge Network | 3 | 0.37 | 2011 |
Let the market drive deployment: a strategy for transitioning to BGP security | 50 | 2.33 | 2011 |
Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights | 18 | 0.88 | 2011 |
Understanding network failures in data centers: measurement, analysis, and implications | 257 | 8.42 | 2011 |
Dude, where’s that IP?: circumventing measurement-based IP geolocation | 22 | 0.98 | 2010 |
Understanding latent sector errors and how to protect against them | 32 | 1.20 | 2010 |
A few chirps about twitter | 333 | 40.85 | 2008 |
Network Information Flow In Network Of Queues | 2 | 0.41 | 2008 |
Scalable on-demand media streaming for heterogeneous clients | 9 | 0.54 | 2008 |
The flattening internet topology: natural evolution, unsightly barnacles or contrived collapse? | 72 | 4.05 | 2008 |
Youtube traffic characterization: a view from the edge | 454 | 34.87 | 2007 |