{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:33:54Z","timestamp":1759073634095,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T00:00:00Z","timestamp":1681516800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,15]]},"DOI":"10.1145\/3578244.3583725","type":"proceedings-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T22:08:41Z","timestamp":1680127721000},"page":"221-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Packet-Level Analysis of Zoom Performance Anomalies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9265-9686","authenticated-orcid":false,"given":"Mehdi","family":"Karamollahi","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9922-7237","authenticated-orcid":false,"given":"Carey","family":"Williamson","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6167-2255","authenticated-orcid":false,"given":"Martin","family":"Arlitt","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, AB, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423621"},{"key":"e_1_3_2_1_2_1","unstructured":"Ashley Carman \"Why Zoom Became So Popular\" https:\/\/www.theverge.com\/2020\/4\/3\/21207053\/zoom-video-conferencing-security-privacy-risk-popularity"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487847"},{"key":"e_1_3_2_1_4_1","volume-title":"Department of Computer Science","author":"Choi Albert","year":"2022","unstructured":"Albert Choi, \"Analysis of Zoom Network Traffic\", CPSC 502 Honours Project, Department of Computer Science, University of Calgary, 8 pages, April 2022."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--98785--5_25"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190326"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488660.3493801"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107290"},{"key":"e_1_3_2_1_9_1","volume-title":"Broadband Internet Technical Advisory Group","author":"Feamster Nick","year":"2021","unstructured":"Nick Feamster, \"2020 Pandemic Network Performance\", Broadband Internet Technical Advisory Group, 2021."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166241"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--98785--5_26"},{"key":"e_1_3_2_1_13_1","first-page":"57","volume-title":"Proceedings of IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)","author":"Karamollahi Mehdi","year":"2022","unstructured":"Mehdi Karamollahi and Carey Williamson, \"Simulation Modeling of Zoom Network Traffic\", Proceedings of IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Nice, France, hybrid event, pp. 57--64, October 2022."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/258612.258676"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.748082"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423655"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487842"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301107"},{"key":"e_1_3_2_1_19_1","volume-title":"Citizen Lab","author":"Marczak Bill","year":"2020","unstructured":"Bill Marczak and John Scott-Railton, \"Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom\", Citizen Lab, University of Toronto, April 2020. https:\/\/citizenlab.ca\/2020\/04\/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561414"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2020.00007"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/s1389--1286(99)00112--7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--72582--2_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3550"},{"key":"e_1_3_2_1_25_1","unstructured":"Wireshark.org Wireshark Frequently Asked Questions https:\/\/wireshark.org\/faq.html"},{"key":"e_1_3_2_1_26_1","unstructured":"Zoom Network and Firewall Settings for Zoom. https:\/\/support.zoom.us\/hc\/en-us\/articles\/201362683-Network-firewall-or-proxy-settings-for-Zoom"},{"key":"e_1_3_2_1_27_1","unstructured":"Zoom https:\/\/www.zoom.us\/docs\/doc\/ZoomConnectionProcessWhitepaper.pdf"}],"event":{"name":"ICPE '23: ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Coimbra Portugal","acronym":"ICPE '23"},"container-title":["Proceedings of the 2023 ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578244.3583725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3578244.3583725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:20Z","timestamp":1750182560000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3578244.3583725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,15]]},"references-count":27,"alternative-id":["10.1145\/3578244.3583725","10.1145\/3578244"],"URL":"https:\/\/doi.org\/10.1145\/3578244.3583725","relation":{},"subject":[],"published":{"date-parts":[[2023,4,15]]},"assertion":[{"value":"2023-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}