Keyphrases
Activity-based Probes
28%
Adversary
19%
Aggregator
28%
Attacker
43%
Avionics
20%
Bitcoin
46%
Botnet
59%
Comparative Analysis
28%
Criminal
25%
Cryptocurrency
16%
Cybercrime
37%
Dynamic Properties
28%
Failure Event
28%
Failure Type
21%
Firmware
23%
Ground Truth Data
23%
ICANN
19%
In the Wild
23%
IP Address
22%
Labor Market
16%
Latency
45%
Lossy
28%
Malware
45%
Measurement Infrastructure
16%
Measurement Study
26%
Monetization
16%
Network Applications
26%
Network Loss
57%
Network Operation
35%
Network Programmability
21%
Order of Magnitude
34%
Packet Loss
19%
Popular
47%
Programmable Data Plane
35%
Programmer
38%
Programming Languages
19%
Property Enforcement
28%
Remote Access Trojan
42%
Router
52%
Routing Protocol
23%
Runtime Monitor
16%
Search Engine Optimization
25%
Spam
100%
Spam Email
28%
Syslog
28%
Threat Intelligence
21%
Underground Forums
28%
Universal Estimation
28%
Vulnerability
21%
World Wide Web
54%
Computer Science
Application Layer Protocol
14%
Application Specific Integrated Circuit
17%
Attackers
43%
Avionics
28%
Bitcoin
53%
Botnets
57%
Comparative Analysis
28%
Component Failure
28%
Consumer Choice
14%
Cybercrime
28%
Cybercriminals
19%
Data Source
52%
Data Structure
21%
Domain Name
17%
Domain Name System
28%
Domain Registration
19%
Dynamic Property
28%
e-Mail
38%
Facebook
15%
High-Performance Computing
28%
Intelligence Data
15%
Malware
52%
Measurement Framework
16%
Misconfiguration
28%
Network Application
28%
Network Component
28%
Network Configuration
28%
Network Environment
28%
Network Failure
57%
Network Operation
35%
Programmability
32%
Programming Language
42%
Relative Error
28%
Remote Access Trojan
42%
Research Community
24%
Router Configuration
33%
Search Engine Optimization
35%
Security Analysis
17%
Security Concern
30%
Semistructured Data
28%
Service Availability
28%
Simple Network Management Protocol
28%
Social Network
21%
Software-Defined Networking
28%
spam
100%
spam email
18%
Structured Data
28%
Symbolic Execution
32%
Threat Intelligence
28%
Universal Measurement
28%