| 2016 | "Recommended For You": A First Look at Content Recommendation Networks. Muhammad Ahmad Bashir, Sajjad Arshad, Christo Wilson |
| 2016 | A First Look at Quality of Mobile Live Streaming Experience: the Case of Periscope. Matti Siekkinen, Enrico Masala, Teemu Kämäräinen |
| 2016 | A Multi-perspective Analysis of Carrier-Grade NAT Deployment. Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson |
| 2016 | A View from the Other Side: Understanding Mobile Phone Characteristics in the Developing World. Sohaib Ahmad, Abdul Lateef Haamid, Zafar Ayyub Qazi, Zhenyu Zhou, Theophilus Benson, Ihsan Ayyub Qazi |
| 2016 | Ad Blockers: Global Prevalence and Impact. Matthew Malloy, Mark McNamara, Aaron Cahn, Paul Barford |
| 2016 | An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kâafar, Vern Paxson |
| 2016 | An Empirical Analysis of a Large-scale Mobile Cloud Storage Service. Zhenyu Li, Xiaohui Wang, Ningjing Huang, Mohamed Ali Kâafar, Zhenhua Li, Jianer Zhou, Gaogang Xie, Peter Steenkiste |
| 2016 | Anatomy of a Personalized Livestreaming System. Bolun Wang, Xinyi Zhang, Gang Wang, Haitao Zheng, Ben Y. Zhao |
| 2016 | Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. Giovane C. M. Moura, Ricardo de Oliveira Schmidt, John S. Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, Cristian Hesselman |
| 2016 | BGP Prefix Delegations: A Deep Dive. Thomas Krenc, Anja Feldmann |
| 2016 | BGPStream: A Software Framework for Live and Historical BGP Data Analysis. Chiara Orsini, Alistair King, Danilo Giordano, Vasileios Giotsas, Alberto Dainotti |
| 2016 | Beyond Counting: New Perspectives on the Active IPv4 Address Space. Philipp Richter, Georgios Smaragdakis, David Plonka, Arthur W. Berger |
| 2016 | Browser Feature Usage on the Modern Web. Peter Snyder, Lara Ansari, Cynthia Bagier Taylor, Chris Kanich |
| 2016 | Characterizing Website Behaviors Across Logged-in and Not-logged-in Users. Andrew J. Kaizer, Minaxi Gupta |
| 2016 | Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules. Fangfan Li, Arash Molavi Kakhki, David R. Choffnes, Phillipa Gill, Alan Mislove |
| 2016 | Condensing Steam: Distilling the Diversity of Gamer Behavior. Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala |
| 2016 | Detecting Unusually-Routed ASes: Methods and Applications. Giovanni Comarela, Evimaria Terzi, Mark Crovella |
| 2016 | Entropy/IP: Uncovering Structure in IPv6 Addresses. Pawel Foremski, David Plonka, Arthur W. Berger |
| 2016 | Identifying and Aggregating Homogeneous IPv4 /24 Blocks with Hobbit. Youndo Lee, Neil Spring |
| 2016 | MAP-IT: Multipass Accurate Passive Inferences from Traceroute. Alexander Marder, Jonathan M. Smith |
| 2016 | MNTP: Enhancing Time Synchronization for Mobile Devices. Sathiya Kumaran Mani, Ramakrishnan Durairajan, Paul Barford, Joel Sommers |
| 2016 | Measuring Video QoE from Encrypted Traffic. Giorgos Dimopoulos, Ilias Leontiadis, Pere Barlet-Ros, Konstantina Papagiannaki |
| 2016 | Measuring and Applying Invalid SSL Certificates: The Silent Majority. Taejoong Chung, Yabing Liu, David R. Choffnes, Dave Levin, Bruce MacDowell Maggs, Alan Mislove, Christo Wilson |
| 2016 | Measuring the Adoption of DDoS Protection Services. Mattijs Jonker, Anna Sperotto, Roland van Rijswijk-Deij, Ramin Sadre, Aiko Pras |
| 2016 | Measuring the Security Harm of TLS Crypto Shortcuts. Drew Springall, Zakir Durumeric, J. Alex Halderman |
| 2016 | Network Growth and Link Prediction Through an Empirical Lens. Qingyun Liu, Shiliang Tang, Xinyi Zhang, Xiaohan Zhao, Ben Y. Zhao, Haitao Zheng |
| 2016 | On the Free Bridge Across the Digital Divide: Assessing the Quality of Facebook's Free Basics Service. Rijurekha Sen, Hasnain Ali Pirzada, Amreesh Phokeer, Zaid Ahmed Farooq, Satadal Sengupta, David R. Choffnes, Krishna P. Gummadi |
| 2016 | Optical Layer Failures in a Large Backbone. Monia Ghobadi, Ratul Mahajan |
| 2016 | Performance Characterization of a Commercial Video Streaming Service. Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford |
| 2016 | Proceedings of the 2016 ACM on Internet Measurement Conference, IMC 2016, Santa Monica, CA, USA, November 14-16, 2016 Phillipa Gill, John S. Heidemann, John W. Byers, Ramesh Govindan |
| 2016 | Reasons Dynamic Addresses Change. Ramakrishna Padmanabhan, Amogh Dhamdhere, Emile Aben, K. C. Claffy, Neil Spring |
| 2016 | Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services. Christophe Leung, Jingjing Ren, David R. Choffnes, Christo Wilson |
| 2016 | Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports. Shane Alcock, Jean-Pierre Möller, Richard Nelson |
| 2016 | TLS Proxies: Friend or Foe? Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala |
| 2016 | Time to Measure the Pi. Peter Membrey, Darryl Veitch, Rocky K. C. Chang |
| 2016 | Towards Better Internet Citizenship: Reducing the Footprint of Internet-wide Scans by Topology Aware Prefix Selection. Johannes Klick, Stephan Lau, Matthias Wählisch, Volker Roth |
| 2016 | Towards a Complete View of the Certificate Ecosystem. Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael D. Bailey, J. Alex Halderman |
| 2016 | Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet. Taejoong Chung, David R. Choffnes, Alan Mislove |
| 2016 | Understanding On-device Bufferbloat for Cellular Upload. Yihua Guo, Feng Qian, Qi Alfred Chen, Zhuoqing Morley Mao, Subhabrata Sen |
| 2016 | User Profiling in the Time of HTTPS. Roberto Gonzalez, Claudio Soriente, Nikolaos Laoutaris |
| 2016 | WHOIS Lost in Translation: (Mis)Understanding Domain Name Expiration and Re-Registration. Tobias Lauinger, Kaan Onarlioglu, Abdelberi Chaabane, William Robertson, Engin Kirda |
| 2016 | Weak Keys Remain Widespread in Network Devices. Marcella Hastings, Joshua Fried, Nadia Heninger |
| 2016 | What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild. Jeremiah Onaolapo, Enrico Mariconti, Gianluca Stringhini |
| 2016 | Yarrp'ing the Internet: Randomized High-Speed Active Topology Discovery. Robert Beverly |
| 2016 | You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian |
| 2016 | Zone Poisoning: The How and Where of Non-Secure DNS Dynamic Updates. Maciej Korczynski, Michal Król, Michel van Eeten |
| 2016 | bdrmap: Inference of Borders Between IP Networks. Matthew J. Luckie, Amogh Dhamdhere, Bradley Huffaker, David D. Clark, K. C. Claffy |