Tcp's initial window—deployment in the wild and its impact on performance
TCP congestion control and particularly its initial congestion window (IW) size is one long-
debated topic that can influence Web performance. Its size is, however, assumed to be static …
debated topic that can influence Web performance. Its size is, however, assumed to be static …
Getting under Alexa's umbrella: infiltration attacks against internet top domain lists
W Rweyemamu, T Lauinger, C Wilson… - … Conference, ISC 2019 …, 2019 - Springer
Top domain rankings such as Alexa are frequently used in security research. Typical uses
include selecting popular websites for measurement studies, and obtaining a sample of …
include selecting popular websites for measurement studies, and obtaining a sample of …
Analysing censorship circumvention with VPNs via DNS cache snooping
Anecdotal evidence suggests an increasing number of people are turning to VPN services
for the properties of privacy, anonymity and free communication over the internet. Despite …
for the properties of privacy, anonymity and free communication over the internet. Despite …
Security in plain txt: Observing the use of dns txt records in the wild
Abstract The Domain Name System is a critical piece of infrastructure that has expanded into
use cases beyond its original intent. DNS TXT records are intentionally very permissive in …
use cases beyond its original intent. DNS TXT records are intentionally very permissive in …
Service traceroute: tracing paths of application flows
I Morandi, F Bronzino, R Teixeira… - Passive and Active …, 2019 - Springer
Traceroute is often used to help diagnose when users experience issues with Internet
applications or services. Unfortunately, probes issued by classic traceroute tools differ from …
applications or services. Unfortunately, probes issued by classic traceroute tools differ from …
Inferring the deployment of top domains over public clouds using dns data
Q Jacquemart, C Pigout… - 2019 Network Traffic …, 2019 - ieeexplore.ieee.org
Cloud technologies are becoming pervasive and available for private companies or public
institutions in different flavors, mostly public cloud or private clouds. Our focus in this work is …
institutions in different flavors, mostly public cloud or private clouds. Our focus in this work is …
Informed Access Network Selection: The Benefits of Socket Intents for Web Performance
Today's end-user devices have multiple access networks available and can achieve better
application performance by distributing traffic across access networks. However, matching …
application performance by distributing traffic across access networks. However, matching …
Getting under Alexa's umbrella: Infiltration attacks against internet top domain lists
E Kirda - … Security: 22nd International Conference, ISC 2019 …, 2019 - books.google.com
Top domain rankings such as Alexa are frequently used in security research. Typical uses
include selecting popular websites for measurement studies, and obtaining a sample of …
include selecting popular websites for measurement studies, and obtaining a sample of …
Whitelists that work: Creating defensible dynamic whitelists with statistical learning
R Burton, L Rocha - 2019 APWG Symposium on Electronic …, 2019 - ieeexplore.ieee.org
Blacklists are a fundamental component of many cyber security products. Typically
populated from a number of sources including machine learning algorithms and malware …
populated from a number of sources including machine learning algorithms and malware …
On the Privacy Implications of Real Time Bidding
MA Bashir - 2019 - search.proquest.com
The massive growth of online advertising has created a need for commensurate amounts of
user tracking. Advertising companies track online users extensively to serve targeted …
user tracking. Advertising companies track online users extensively to serve targeted …