Targeted online advertising has become an inextricable part of the way Web content and applications are monetized. At the beginning, online advertising consisted of simple ad …
B Hou, Z Cai, K Wu, J Su… - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Fast Internet-wide network measurement plays an important role in cybersecurity analysis and network asset detection. The vast address space of IPv6, however, makes it infeasible to …
Abstract Economics Job Market Rumors (EJMR) is an online forum and clearinghouse for information on the academic job market for economists. It also includes content that is …
IP addresses are commonly used to identify hosts or properties of hosts. The address assigned to a host may change, however, and the extent to which these changes occur in …
N Liu, C Jia, B Hou, C Hou, Y Chen, Z Cai - Computer Networks, 2023 - Elsevier
Topology discovery can infer the interconnection relationship between network entities. A complete network topology is of great significance for network security analysis, application …
X Feng, Q Li, K Sun, Z Qian, G Zhao, X Kuang… - 31st USENIX Security …, 2022 - usenix.org
ICMP redirect is a mechanism that allows an end host to dynamically update its routing decisions for particular destinations. Previous studies show that ICMP redirect may be …
We present a new system to protect IoT devices in multiple premises by a single Virtual Network Function (VNF) deployed in the ISP network. The system is based on the …
Enterprise networks continue to grow in scale and complexity, encompassing a wide range of Internet-connected end-points including web servers/proxies, DNS/VPN/mail servers, and …
Blocklists, consisting of known malicious IP addresses, can be used as a simple method to block malicious traffic. However, blocklists can potentially lead to unjust blocking of …