Full Papers

  1. “dMAPAR-HMM: Reforming Traffic Model for Improving Performance Bound with Stochastic Network Calculus”
    Q. Yang, X. Peng, H. Yang, G. Zhang, and B. Bai (Huawei)

  2. “Hazardous Echoes: The DNS Resolvers that Should Be Put on Mute”
    R. Yazdani (University of Twente), Y. Nosyk (Université Grenoble Alpes), R. Holz (University of Twente), M. Korczynski (Université Grenoble Alpes), M. Jonker and A. Sperotto (University of Twente)

  3. “Encrypted Traffic Classification: the QUIC Case”
    J. Luxemburk and K. Hynek (FIT CTU & CESNET), T. Cejka (CESNET)

  4. “I refuse if you let me: Studying User Behavior with Privacy Banners at Scale”
    N. Jha (Politecnico di Torino), M. Trevisan (University of Trieste), M. Mellia (Politecnico di Torino), R. Irarrazaval and D. Fernandez (Illow)

  5. “Live Long and Prosper: Analyzing Long-Lived MOAS Prefixes in BGP”
    K. Z. Sediqi, A. Feldmann, O. Gasser (Max Planck Institute for Informatics)

  6. “W-Bad: Interception, Inspection, and Interference with Web Proxy Auto-Discovery (WPAD)”
    C. Deccio (Brigham Young University)

  7. “Bias in Internet Measurement Platforms”
    P. Sermpezis (Aristotle University of Thessaloniki), L. Prehn (MPII), S. Kostoglou (Aristotle University of Thessaloniki), M. Flores (Edgio), A. Vakali (Aristotle University of Thessaloniki), E. Aben (RIPE NCC)

  8. “A Worldwide Look Into Mobile Access Networks Through the Eyes of AmiGos”
    M. Varvello (Nokia Bell Labs), Y. Zaki (New York University Abu Dhabi)

  9. “Your Code is 0000: An Analysis of the Disposable Phone Numbers Ecosystem”
    J. M. Moreno (Universidad Carlos III de Madrid), S. Matic (IMDEA Software Institute), N. Vallina-Rodriguez (IMDEA Networks/AppCensus), J. Tapiador (Universidad Carlos III de Madrid)

  10. “Instant Messaging Meets Video Conferencing: Studying the Performance of IM Video Calls”
    L. Grote, I. Kunze, C. Sander, K. Wehrle (RWTH Aachen University)

  11. “An Analysis of War Impact on Ukrainian Critical Infrastructure through Network Measurements”
    R. Singla (Texas A&M University), S. Srinivasa (Aalborg University), N. Reddy (Texas A&M University), J. M. Pedersen (Aalborg University), E. Vasilomanolakis (Technical University of Denmark), R. Bettati (Texas A&M University)

  12. “Many or Few Samples? Comparing Transfer, Contrastive and Meta-Learning in Encrypted Traffic Classification”
    I. Guarino (Universita di Napoli, Federico II), C. Wang and A. Finamore (Huawei Technologies France, SASU), A. Pescape (Universita di Napoli, Federico II), D. Rossi (Huawei Technologies France, SASU)

  13. “Longitudinal Analysis of Inter-city Network Delays”
    S. Ozcan (Simula Metropolitan Center for Digital Engineering & University of Oslo), I. Livadariu (Simula Metropolitan Center for Digital Engineering), G. Smaragdakis (Delft University of Technology), C. Griwodz (University of Oslo)

  14. “Target Acquired? Evaluating Target Generation Algorithms for IPv6”
    L. Steger, L. Kuang, J. Zirngibl, and G. Carle (Technical University of Munich), O. Gasser (Max Planck Institute for Informatics)

  15. “Errare humanum est: What do RFC Errata say about Internet Standards?”
    S. McQuistin (University of Glasgow), M. Karan and P. Khare (Queen Mary University of London), C. Perkins (University of Glasgow), M. Purver, P. Healey, I. Castro (Queen Mary University of London), G. Tyson (HKUST)

Extended Abstracts

  1. “Not all DGAs are Born the Same – Improving Lexicographic based Detection of DGA Domains through AI/ML”
    L. Torrealba (NIC Labs, Universidad de Chile), P. Casas (AIT Austrian Institute of Technology), J. Bustos-Jiménez (NIC Labs, Universidad de Chile), G. Capdehourat (Plan Ceibal & Universidad de la República), M. Findrik (cyan Security Group)

  2. “Unevenly Spaced Time Series from Network Traffic”
    J. Koumar (Czech Technical University in Prague), T. Cejka (CESNET)

  3. “Towards Detecting and Geolocalizing Web Scrapers with Round Trip Time Measurements”
    E. Chiapponi (EURECOM), M. Dacier (RC3, CEMSE, KAUST), O. Thonnard (Amadeus IT Group)

  4. “Detecting IP-tracking proof interfaces by looking for NATs”
    A. Buchet (UCLouvain), P. Snyder (Brave Software), H. Haddadi (Imperial College London & Brave Software), C. Pelsser (UCLouvain)

  5. “Phishing in Style: Characterizing Phishing Websites in the Wild”
    D. Hasselquist (Linköping University, Sectra Communications), E. Kihlberg Gawell, A. Karlström, N. Carlsson (Linköping University)

  6. “An Initial Look into the Performance Evolution of 5G Non-Standalone Networks”
    G. Caso and M. Rajiullah (Karlstad University), K. Kousias (University of Oslo), U. Ali and L. De Nardis (Sapienza University of Rome), A. Brunstrom (Karlstad University), O. Alay (University of Oslo), M. Neri (Rohde&Schwarz), M. G. Di Benedetto (Sapienza University of Rome)

  7. “Packet Field Tree: a Hybrid Approach to Automated Protocol Reverse-Engineering”
    A. Rohl (University of Adelaide & Defence Science Technology Group), M. Roughan and M. White (University of Adelaide), A. Chambers (Defence Science Technology Group)

  8. “France Through the Lens of Mobile Traffic Data”
    O. E. Martinez-Durive and S. Mishra (IMDEA Networks Institute, Carlos III University of Madrid), C. Ziemlicki, S. Rubrichi, and Z. Smoreda (Orange Innovation, France), M. Fiore (IMDEA Networks Institute)

  9. “Deep Generative Replay for Multivariate Time-Series Monitoring with Variational Autoencoders”
    G. García González (Universidad de la República), P. Casas (AIT Austrian Institute of Technology), A. Fernández (Universidad de la República)

  10. “Investigating Gaze Behavior in Phishing Email Identification”
    F. Pietrantonio, A. Botta, and G. Ventre (University of Naples Federico II), L. Gallo (Cyber Security Lab TIM S.p.A.), S. Zinno (University of Naples Federico II), L. Mancuso and R. Presta (Scienza Nuova Research Centre, University Suor Orsola Benincasa)