{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:00:41Z","timestamp":1743109241599},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737598","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"source":"Crossref","is-referenced-by-count":5,"title":["Virtual Speed Test: an AP Tool for Passive Analysis of Wireless LANs"],"prefix":"10.1109","author":[{"given":"Peshal","family":"Nayak","sequence":"first","affiliation":[]},{"given":"Santosh","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Edward W.","family":"Knightly","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139226424","author":"harchol-balter","year":"2013","journal-title":"Performance Modeling and Design of Computer Systems Queueing Theory in Action"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2012.6388126"},{"key":"ref12","first-page":"356","article-title":"RFC-1122: Requirements for internet hosts","author":"braden","year":"1989","journal-title":"Request for Comments"},{"key":"ref13","year":"2013","journal-title":"Enhancements for Very High Throughput for Operation in Bands below 6 GHz"},{"key":"ref14","year":"2009","journal-title":"Enhancements for Higher Throughput"},{"key":"ref15","article-title":"Transmission control protocol-darpa internet program protocol specification","author":"jon","year":"1981","journal-title":"Technical report RFC-793 DARPA"},{"key":"ref16","year":"0","journal-title":"Companion Technical Report"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057048"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.04.004"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028832"},{"key":"ref28","article-title":"TCP flow analysis for defense against shrew DDoS attacks","author":"chen","year":"2007","journal-title":"Proc of IEEE ICC"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/APCC.2017.8303960"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36480-3_11"},{"key":"ref3","year":"2018","journal-title":"Xfinity Speed Test"},{"key":"ref6","year":"2012","journal-title":"How does the test itself work? How is the result calculated?"},{"key":"ref29","article-title":"P2P traffic identification by TCP flow analysis","author":"zhou","year":"2006","journal-title":"Proceedings of IWNA"},{"key":"ref5","year":"2012","journal-title":"How Does the Begin Test Button Select a Server?"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.104"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_17"},{"key":"ref2","year":"2018","journal-title":"AT & T Internet Speed Test"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500448"},{"key":"ref1","year":"2018","journal-title":"Ookla Speedtest"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015476"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1851307.1851310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848014"},{"key":"ref24","article-title":"Pie in the sky: Online passive interference estimation for enterprise wlans","author":"shrivastava","year":"2011","journal-title":"Proc of NSDI"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159920"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168952"},{"key":"ref25","article-title":"Throughput prediction in wireless networks using statistical learning","author":"rattaro","year":"2010","journal-title":"Proc LAW"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","location":"Paris, France","start":{"date-parts":[[2019,4,29]]},"end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737598.pdf?arnumber=8737598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:07:26Z","timestamp":1663718846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infocom.2019.8737598","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}