{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:14Z","timestamp":1740122594472,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T00:00:00Z","timestamp":1537315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11277-018-5974-0","type":"journal-article","created":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T07:47:07Z","timestamp":1537343227000},"page":"1443-1464","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure and Differentially Private Detection of Net Neutrality Violations by Means of Crowdsourced Measurements"],"prefix":"10.1007","volume":"107","author":[{"given":"Maria Silvia","family":"Abba Legnazzi","sequence":"first","affiliation":[]},{"given":"Cristina","family":"Rottondi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7508-9706","authenticated-orcid":false,"given":"Giacomo","family":"Verticale","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,19]]},"reference":[{"key":"5974_CR1","unstructured":"Akamai: Real user monitoring. \n                              www.akamai.com\/uk\/en\/resources\/real-user-monitoring.jsp\n                              \n                           . Accessed 17 Sept 2018."},{"key":"5974_CR2","doi-asserted-by":"publisher","unstructured":"Anjum, A., & Anjum, A. (2014). Differentially private k-anonymity. In 12th International conference on frontiers of information technology (FIT), 2014 (pp. 153\u2013158). \n                              https:\/\/doi.org\/10.1109\/FIT.2014.37\n                              \n                           .","DOI":"10.1109\/FIT.2014.37"},{"issue":"7","key":"5974_CR3","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/MCOM.2017.1600417","volume":"55","author":"A Antonopoulos","year":"2017","unstructured":"Antonopoulos, A., Kartsakli, E., Perillo, C., & Verikoukis, C. (2017). Shedding light on the internet: Stakeholders and network neutrality. IEEE Communications Magazine, 55(7), 216\u2013223.","journal-title":"IEEE Communications Magazine"},{"key":"5974_CR4","doi-asserted-by":"crossref","unstructured":"Botta, A., Avallone, A., Garofalo, M., & Ventre, G. (2016). Internet streaming and network neutrality: Comparing the performance of video hosting services. In ICISSP (pp. 514\u2013521).","DOI":"10.5220\/0005798705140521"},{"key":"5974_CR5","doi-asserted-by":"crossref","unstructured":"De\u00a0Martin, J. C., & Glorioso, A. (2008). The neubot project: A collaborative approach to measuring internet neutrality. In 2008 IEEE international symposium on technology and society (pp. 1\u20134). IEEE.","DOI":"10.1109\/ISTAS.2008.4559763"},{"key":"5974_CR6","unstructured":"Dischinger, M., Marcon, M., Guha, S., Gummadi, P. K., Mahajan, R., & Saroiu, S. (2010). Glasnost: Enabling end users to detect traffic differentiation. In NSDI (pp. 405\u2013418)."},{"key":"5974_CR7","volume-title":"Automata, languages and programming. ICALP 2006. Lecture Notes in Computer Science","author":"C Dwork","year":"2006","unstructured":"Dwork, C. (2006). Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, I. Wegener (Ed.), Automata, languages and programming. ICALP 2006. Lecture Notes in Computer Science (vol. 4052, pp. 1\u201312). Springer, Berlin."},{"issue":"3\u20134","key":"5974_CR8","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3\u20134), 211\u2013407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"5974_CR9","unstructured":"FCC. (2014). Validated data: Measuring broadband America 2014. \n                              www.fcc.gov\/general\/validated-data-measuring-broadband-america-2014\n                              \n                           . Accessed 17 Sept 2018."},{"key":"5974_CR10","unstructured":"FCC. (2015). Open internet. \n                              https:\/\/www.fcc.gov\/general\/open-internet\n                              \n                           . Accessed 17 Sept 2018."},{"key":"5974_CR11","doi-asserted-by":"crossref","unstructured":"Garrett, T., Dustdar, S., Bona, L. C., & Duarte, E. P. (2017). Ensuring network neutrality for future distributed systems. In IEEE 37th international conference on distributed computing systems (ICDCS), 2017 (pp. 1780\u20131786). IEEE.","DOI":"10.1109\/ICDCS.2017.49"},{"key":"5974_CR12","doi-asserted-by":"crossref","unstructured":"Kanuparthy, P., & Dovrolis, C. (2010). Diffprobe: Detecting ISP service discrimination. In INFOCOM, 2010 proceedings IEEE (pp. 1\u20139). IEEE.","DOI":"10.1109\/INFCOM.2010.5461983"},{"key":"5974_CR13","unstructured":"Kasiviswanathan, S. P., & Smith, A. (2008). A note on differential privacy: Defining resistance to arbitrary side information. CoRR \n                              arXiv:0803.3946\n                              \n                           ."},{"key":"5974_CR14","unstructured":"Li, N., Qardaji, W. H. & Su, D. (2011). Provably private data anonymization: Or, k-anonymity meets differential privacy. Arxiv preprint."},{"issue":"4","key":"5974_CR15","doi-asserted-by":"publisher","first-page":"56:1","DOI":"10.1145\/3040966","volume":"8","author":"A Maltinsky","year":"2017","unstructured":"Maltinsky, A., Giladi, R., & Shavitt, Y. (2017). On network neutrality measurements. ACM Transactions on Intelligent Systems and Technology, 8(4), 56:1\u201356:22.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"5974_CR16","doi-asserted-by":"publisher","unstructured":"Miorandi, D., Carreras, I., Gregori, E., Graham, I., & Stewart, J. (2013). Measuring net neutrality in mobile internet: Towards a crowdsensing-based citizen observatory. In: 2013 IEEE international conference on communications workshops (ICC) (pp. 199\u2013203). \n                              https:\/\/doi.org\/10.1109\/ICCW.2013.6649228\n                              \n                           .","DOI":"10.1109\/ICCW.2013.6649228"},{"key":"5974_CR17","unstructured":"Misurainternet. (2018). Il progetto italiano per la valutazione della qualit\u00e0 dell\u2019accesso a internet da postazione fissa. \n                              www.misurainternet.it\n                              \n                           . (in Italian). Accessed 17 Sept 2018."},{"key":"5974_CR18","unstructured":"Ookla. (2018). The definitive source for global internet metrics. \n                              www.ookla.com\n                              \n                           . Accessed 17 Sept 2018."},{"key":"5974_CR19","unstructured":"Samknows. (2018). \n                              www.samknows.com\n                              \n                           . Accessed 17 Sept 2018."},{"issue":"05","key":"5974_CR20","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"5974_CR21","doi-asserted-by":"publisher","unstructured":"Tariq, M. B., Motiwala, M., Feamster, N., & Ammar, M. (2009). Detecting network neutrality violations with causal inference. In Proceedings of the 5th international conference on emerging networking experiments and technologies, CoNEXT \u201909 (pp. 289\u2013300). ACM, New York, NY, USA. \n                              https:\/\/doi.org\/10.1145\/1658939.1658972\n                              \n                           .","DOI":"10.1145\/1658939.1658972"},{"issue":"4","key":"5974_CR22","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/2740070.2626308","volume":"44","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Mara, O., & Argyraki, K. (2014). Network neutrality inference. SIGCOMM Computer Communication Review, 44(4), 63\u201374. \n                              https:\/\/doi.org\/10.1145\/2740070.2626308\n                              \n                           .","journal-title":"SIGCOMM Computer Communication Review"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5974-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5974-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5974-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:15:20Z","timestamp":1568834120000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5974-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,19]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["5974"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5974-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,9,19]]},"assertion":[{"value":"19 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}