{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T13:58:00Z","timestamp":1777643880841,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T00:00:00Z","timestamp":1566172800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Verizon Labs"},{"name":"Arcep (Autorit\u00e9 de R\u00e9gulation des Communications \u00c9lectroniques et des Postes)"},{"DOI":"10.13039\/100008536","name":"Amazon Web Services","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008536","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1617728,CNS-1700657,CNS-1350720,CNS-1740895,CNS-1651784"],"award-info":[{"award-number":["CNS-1617728,CNS-1700657,CNS-1350720,CNS-1740895,CNS-1651784"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,19]]},"DOI":"10.1145\/3341302.3342092","type":"proceedings-article","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T19:32:36Z","timestamp":1565811156000},"page":"130-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["A large-scale analysis of deployed traffic differentiation practices"],"prefix":"10.1145","author":[{"given":"Fangfan","family":"Li","sequence":"first","affiliation":[{"name":"Northeastern University"}]},{"given":"Arian Akhavan","family":"Niaki","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst"}]},{"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[{"name":"University of Massachusetts Amherst"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2019,8,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.att.com\/offers\/streamsaver.html. (April","author":"Saver T Stream","year":"2017","unstructured":"2017. AT& T Stream Saver . https:\/\/www.att.com\/offers\/streamsaver.html. (April 2017 ). 2017. AT&T Stream Saver. https:\/\/www.att.com\/offers\/streamsaver.html. (April 2017)."},{"key":"e_1_3_2_2_2_1","volume-title":"All you need to know about Net Neutrality rules in the EU. https:\/\/berec.europa.eu\/eng\/netneutrality\/. (April","year":"2018","unstructured":"2018. All you need to know about Net Neutrality rules in the EU. https:\/\/berec.europa.eu\/eng\/netneutrality\/. (April 2018 ). 2018. All you need to know about Net Neutrality rules in the EU. https:\/\/berec.europa.eu\/eng\/netneutrality\/. (April 2018)."},{"key":"e_1_3_2_2_3_1","volume-title":"Apple Is Blocking an App That Detects Net Neutrality Violations From the App Store. https:\/\/motherboard.vice.com\/en_us\/article\/j5vn9k\/apple-blocking-net-neutrality-app-wehe. (April","year":"2018","unstructured":"2018. Apple Is Blocking an App That Detects Net Neutrality Violations From the App Store. https:\/\/motherboard.vice.com\/en_us\/article\/j5vn9k\/apple-blocking-net-neutrality-app-wehe. (April 2018 ). 2018. Apple Is Blocking an App That Detects Net Neutrality Violations From the App Store. https:\/\/motherboard.vice.com\/en_us\/article\/j5vn9k\/apple-blocking-net-neutrality-app-wehe. (April 2018)."},{"key":"e_1_3_2_2_4_1","volume-title":"FCC Releases Restoring Internet Freedom Order. https:\/\/www.fcc.gov\/fcc-releases-restoring-internet-freedom-order. (January","year":"2018","unstructured":"2018. FCC Releases Restoring Internet Freedom Order. https:\/\/www.fcc.gov\/fcc-releases-restoring-internet-freedom-order. (January 2018 ). 2018. FCC Releases Restoring Internet Freedom Order. https:\/\/www.fcc.gov\/fcc-releases-restoring-internet-freedom-order. (January 2018)."},{"key":"e_1_3_2_2_5_1","volume-title":"Verizon Unlimited Plans. https:\/\/www.verizonwireless.com\/plans\/unlimited\/. (December","year":"2018","unstructured":"2018. Verizon Unlimited Plans. https:\/\/www.verizonwireless.com\/plans\/unlimited\/. (December 2018 ). 2018. Verizon Unlimited Plans. https:\/\/www.verizonwireless.com\/plans\/unlimited\/. (December 2018)."},{"key":"e_1_3_2_2_6_1","volume-title":"Wehe: Check Your ISP for Net neutrality Violations. https:\/\/dd.meddle.mobi\/. (April","year":"2018","unstructured":"2018. Wehe: Check Your ISP for Net neutrality Violations. https:\/\/dd.meddle.mobi\/. (April 2018 ). 2018. Wehe: Check Your ISP for Net neutrality Violations. https:\/\/dd.meddle.mobi\/. (April 2018)."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/www.att.com\/plans\/wireless.html. (January","author":"Plans T","year":"2019","unstructured":"2019. AT& T Plans . https:\/\/www.att.com\/plans\/wireless.html. (January 2019 ). 2019. AT&T Plans. https:\/\/www.att.com\/plans\/wireless.html. (January 2019)."},{"key":"e_1_3_2_2_8_1","volume-title":"Recording a packet trace. https:\/\/developer.apple.com\/documentation\/network\/recording_a_packet_trace. (June","year":"2019","unstructured":"2019. Recording a packet trace. https:\/\/developer.apple.com\/documentation\/network\/recording_a_packet_trace. (June 2019 ). 2019. Recording a packet trace. https:\/\/developer.apple.com\/documentation\/network\/recording_a_packet_trace. (June 2019)."},{"key":"e_1_3_2_2_9_1","volume-title":"Wireshark's TCP Analysis. https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/ChAdvTCPAnalysis.html. (June","year":"2019","unstructured":"2019. Wireshark's TCP Analysis. https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/ChAdvTCPAnalysis.html. (June 2019 ). 2019. Wireshark's TCP Analysis. https:\/\/www.wireshark.org\/docs\/wsug_html_chunked\/ChAdvTCPAnalysis.html. (June 2019)."},{"key":"e_1_3_2_2_10_1","volume-title":"In Proc. of Integrated Network Management (IM2013)","author":"Bashko Vitali","year":"2013","unstructured":"Vitali Bashko , Nikolay Melnikov , Anuj Sehgal , and Jurgen Schonwalder . 2013 . BonaFide: A traffic shaping detection tool for mobile networks . In In Proc. of Integrated Network Management (IM2013) . Vitali Bashko, Nikolay Melnikov, Anuj Sehgal, and Jurgen Schonwalder. 2013. BonaFide: A traffic shaping detection tool for mobile networks. In In Proc. of Integrated Network Management (IM2013)."},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. of USENIX NSDI.","author":"Dischinger Marcel","year":"2010","unstructured":"Marcel Dischinger , Massimiliano Marcon , Saikat Guha , Krishna P. Gummadi , Ratul Mahajan , and Stefan Saroiu . 2010 . Glasnost: Enabling End Users to Detect Traffic Differentiation . In Proc. of USENIX NSDI. Marcel Dischinger, Massimiliano Marcon, Saikat Guha, Krishna P. Gummadi, Ratul Mahajan, and Stefan Saroiu. 2010. Glasnost: Enabling End Users to Detect Traffic Differentiation. In Proc. of USENIX NSDI."},{"key":"e_1_3_2_2_12_1","volume-title":"Protecting and Promoting the Open Internet. https:\/\/www.federalregister.gov\/articles\/2015\/04\/13\/2015-07841\/protecting-and-promoting-the-open-internet. (April","author":"FCC.","year":"2015","unstructured":"FCC. 2015. Protecting and Promoting the Open Internet. https:\/\/www.federalregister.gov\/articles\/2015\/04\/13\/2015-07841\/protecting-and-promoting-the-open-internet. (April 2015 ). FCC. 2015. Protecting and Promoting the Open Internet. https:\/\/www.federalregister.gov\/articles\/2015\/04\/13\/2015-07841\/protecting-and-promoting-the-open-internet. (April 2015)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934873"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1951.10500769"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940136.2940140"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815691"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833745"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068860"},{"key":"e_1_3_2_2_19_1","volume-title":"Optimal detection of changepoints with a linear computational cost. J. Amer. Statist. Assoc. 500","author":"Killick Rebecca","year":"2012","unstructured":"Rebecca Killick , Paul Fearnhead , and Idris A Eckley . 2012. Optimal detection of changepoints with a linear computational cost. J. Amer. Statist. Assoc. 500 ( 2012 ). Rebecca Killick, Paul Fearnhead, and Idris A Eckley. 2012. Optimal detection of changepoints with a linear computational cost. J. Amer. Statist. Assoc. 500 (2012)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987464"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131376"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413247.2413282"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC.2015.8"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658972"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815680"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934941"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644905"}],"event":{"name":"SIGCOMM '19: ACM SIGCOMM 2019 Conference","location":"Beijing China","acronym":"SIGCOMM '19","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the ACM Special Interest Group on Data Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342092","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341302.3342092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341302.3342092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,19]]},"references-count":27,"alternative-id":["10.1145\/3341302.3342092","10.1145\/3341302"],"URL":"https:\/\/doi.org\/10.1145\/3341302.3342092","relation":{},"subject":[],"published":{"date-parts":[[2019,8,19]]},"assertion":[{"value":"2019-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}