000 | 05231nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-031-28486-1 | ||
003 | DE-He213 | ||
005 | 20240207153546.0 | ||
007 | cr nn 008mamaa | ||
008 | 230309s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031284861 _9978-3-031-28486-1 |
||
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aPassive and Active Measurement _h[electronic resource] : _b24th International Conference, PAM 2023, Virtual Event, March 21-23, 2023, Proceedings / _cedited by Anna Brunstrom, Marcel Flores, Marco Fiore. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIV, 670 p. 258 illus., 238 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13882 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aVPNs and Infrastructure -- Measuring the Performance of iCloud Private Relay -- Characterizing the VPN Ecosystem in the Wild -- Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers -- TLS -- Exploring the evolution of the TLS certificate ecosystem -- Analysis of TLS Prefiltering for IDS Acceleration -- DissecTLS: A Scalable Active Scanner for TLS Server Configurations, Capabilities, and TLS Fingerprinting -- Applications -- A Measurement-Derived Functional Model for the Interaction between Congestion Control and QoE in Video Conferencing -- Effects of Political Bias and Reliability on Temporal User Engagement with News Articles Shared on Facebook -- Measurement Tools -- Efficient continuous latency monitoring with eBPF -- Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets -- Towards diagnosing accurately the performance bottleneck of software-based network function implementation -- Network Performance -- Evaluation of the ProgHW/SW Architectural Design Space of Bandwidth Estimation -- An In-Depth Measurement Analysis of 5G mmWave PHY Latency and its Impact on End-to-End Delay -- A Characterization of Route Variability in LEO Satellite Networks -- Topology -- Improving the Inference of Sibling Autonomous Systems -- A Global Measurement of Routing Loops on the Internet -- as2org+ : Enriching AS-to-Organization Mappings with PeeringDB -- RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes -- Security and Privacy -- Intercept and Inject: DNS Response Manipulation in the Wild -- A First Look at Brand Indicators for Message Identification (BIMI) -- A Second Look at DNS QNAME Minimization -- DNS -- How Ready Is DNS for an IPv6-Only World? -- TTL Violation of DNS Resolvers in the Wild -- Operational Domain Name Classification: From Automatic Ground Truth Generation to Adaptation to Missing Values -- Web -- A First Look at Third-Party Service Dependencies of Web Services in Africa -- Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies. -Quantifying User Password Exposure to Third-Party CDNs. | |
520 | _aThis book constitutes the proceedings of the 24th International Conference, PAM 2023, held as a virtual event, March 21-23, 2023. The 18 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 80 submissions. The papers are organized in the following topical sections: VPNs and Infrastructure; TLS; Applications; Measurement Tools; Network Performance; Topology; Security and Privacy; DNS; and Web. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aData and Information Security. |
700 | 1 |
_aBrunstrom, Anna. _eeditor. _0(orcid)0000-0001-7311-9334 _1https://orcid.org/0000-0001-7311-9334 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFlores, Marcel. _eeditor. _0(orcid)0000-0001-8881-2123 _1https://orcid.org/0000-0001-8881-2123 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFiore, Marco. _eeditor. _0(orcid)0000-0002-0772-9967 _1https://orcid.org/0000-0002-0772-9967 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031284854 |
776 | 0 | 8 |
_iPrinted edition: _z9783031284878 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13882 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-28486-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cLIBRO_ELEC | ||
999 |
_c261352 _d261351 |