Poster: A Comprehensive Categorization of SMS Scams
Sharad Agarwal, Emma Harvey, Marie Vasek.Poster: A Dataset on Peering Policies of Autonomous Systems
Martin Thodi, Josiah Chavula, Amreesh Phokeer.Poster: A First Look at IPX Hub Breakout with Airalo
Daniel (HyunSeok) Jang, Matteo Varvello, Andra Lutu, Yasir Zaki, Daniel (HyunSeok) Jang.Poster: A Fistful of Queries: Accurate and Lightweight Anycast Enumeration of Public DNS
Chengxi Xu, Yuxuan Wang, Yunyi Zhang, Fan Shi.Poster: An Investigation into the State of Security of Routers on the Internet
Sina Rostami, Tiago Heinrich, Taha Albakour.Poster: Analysis of the Internet Ecosystem in East Africa: DNS resolution, ASN peering, and Utilization of IXPs.
Semebia Yaa Wurah, Theophilus A. Benson, Edwin Mugume.Poster: Application of Graph Neural Networks for Representing and Analyzing Internet Topology via the BGP Protocol
Valentina Esteban, Ivana Bachmann, Sebastian Ferrada.Poster: Building Comprehensive Telecommunications Datasets During a Major Climatic Event
Leandro Bertholdo, Renan Paredes Barreto, Pedro Marcos.Poster: Capture the List: Ranking Manipulation Leveraging Open Forwarders
Chengxi Xu, Yunyi Zhang, Fan Shi.Poster: Diverging Branches - How different are RPKI Trees across RIRs?
Deepak Gouda, Cecilia Testart.Poster: Empirical Analysis of Lifespan Increase of IoT C&C Domains
Daniel Uroz, Ricardo J. Rodríguez, Carlos Gañán.Poster: Enhancing IODA via detecting performance degradation
Weili Wu, Zachary S Bischof, Cecilia Testart, Alberto Dainotti.Poster: Estimating cell load from end-user crowdsourced measurements in a real-world cellular network
Zoraida Frias, Luis Mendo, Jorge Garcia-Cabeza.Poster: How much of the Web cares about QUIC’s anti-ossification features?
Naveenraj Muthuraj, Paul Lu.Poster: Identifying Filter Bubble Based on Feed-Level Embedding Similarity Analysis
Junsang Im, Jeong-woo Jang.Poster: Investigating Autonomous Systems Recurrently Causing Unexplained Multi-Origin AS Conflicts
Olivier Bemba, Cecilia Testart, Alberto Dainotti.Poster: Investigating Network Security Post-Outage: Open Ports Vulnerabilities
Zahra Yazdani, Paul Pearce, Alberto Dainotti, Cecilia Testart, Zahra Yazdani.Poster: Investigating traffic engineering properties at Internet eXchange Points
Joaquim Pereira, Pedro Marcos.Poster: On Integrating Sphinx in IPFS
Erik Daniel, Florian Tschorsch, Erik Daniel.Poster: Predicting Internet Shutdowns: A Machine Learning Approach
Amreesh Phokeer, Jules Zirikana.Poster: The State of Malware Loaders
Cristian Munteanu, Georgios Smaragdakis, Anja Feldmann.Poster: Toward achieving inter-protocol friendliness through estimation of BBR behaviors using machine learning
Satoshi Utsumi, Junya Ishikawa, Fuya Ohba, Salahuddin Zabir, Mohammed Atiquzzaman.Poster: Towards A Low-Cost Mobile Internet Measurement Infrastructure for Africa
Erick Semindu, Pamely Zantou, Eyerusalem Birhan, Semebia Y. Wurah, Theophilus A. Benson, Assane Gueye.Poster: Towards Privacy-Awareness in Using Smartphone Apps for Mobility Services
Lucile Bauchard, Daphne Tuncer.Poster: Traffic Engineering Security Implications
Renan Paredes Barreto, Leandro Bertholdo, Pedro Marcos.Poster: Twinkle, Twinkle, Streaming Star: Illuminating CDN Performance over Starlink
Rohan Bose, Nitinder Mohan, Jörg Ott.Poster: Unveiling Urban Emissions from Bangkok Air Monitoring
Teeratat Bunsantrakul, Karl M Christiaens, Adriana Marcela Duran Pabon, Bomi I Owoka, Maria Sofia Velasco Garcia, Wangkun Xu, Daphne TUNCER.Poster: Web Dependency Analyzer to Identify Resource Dependencies and their Impact on Rendering
Yasin Alhamwy, Paul Mertens, Oliver Hohlfeld.