{"id":"https://openalex.org/W7106231205","doi":"https://doi.org/10.1145/3730567.3764449","title":"Tracking Internet Disruptions in Ukraine: Insights from Three Years of Active Full Block Scans","display_name":"Tracking Internet Disruptions in Ukraine: Insights from Three Years of Active Full Block Scans","publication_year":2025,"publication_date":"2025-10-28","ids":{"openalex":"https://openalex.org/W7106231205","doi":"https://doi.org/10.1145/3730567.3764449"},"language":null,"primary_location":{"id":"doi:10.1145/3730567.3764449","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764449","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3730567.3764449","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Florian Holzbauer","orcid":"https://orcid.org/0000-0003-2494-0331"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Florian Holzbauer","raw_affiliation_strings":["Faculty of Computer Science, University of Vienna, Vienna, Austria and Doctoral School Computer Science, University of Vienna, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0003-2494-0331","affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of Vienna, Vienna, Austria and Doctoral School Computer Science, University of Vienna, Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Sebastian Strobl","orcid":"https://orcid.org/0009-0006-8202-3610"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Sebastian Strobl","raw_affiliation_strings":["SBA Research, Vienna, Austria"],"raw_orcid":"https://orcid.org/0009-0006-8202-3610","affiliations":[{"raw_affiliation_string":"SBA Research, Vienna, Austria","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"last","author":{"id":null,"display_name":"Johanna Ullrich","orcid":"https://orcid.org/0000-0003-0297-9614"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Johanna Ullrich","raw_affiliation_strings":["University of Vienna, Vienna, Austria"],"raw_orcid":"https://orcid.org/0000-0003-0297-9614","affiliations":[{"raw_affiliation_string":"University of Vienna, Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I129774422"],"apc_list":null,"apc_paid":null,"fwci":1.1805,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8515671,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"474","last_page":"492"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.07840000092983246,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.07840000092983246,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.05900000035762787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.04010000079870224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.8027999997138977},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.574999988079071},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.5145999789237976},{"id":"https://openalex.org/keywords/internet-access","display_name":"Internet access","score":0.5103999972343445},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.45910000801086426},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.44369998574256897},{"id":"https://openalex.org/keywords/duration","display_name":"Duration (music)","score":0.4009999930858612},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.36880001425743103}],"concepts":[{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.8027999997138977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6327000260353088},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.574999988079071},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.5145999789237976},{"id":"https://openalex.org/C83849155","wikidata":"https://www.wikidata.org/wiki/Q1472399","display_name":"Internet access","level":3,"score":0.5103999972343445},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.45910000801086426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4499000012874603},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.44369998574256897},{"id":"https://openalex.org/C112758219","wikidata":"https://www.wikidata.org/wiki/Q16038819","display_name":"Duration (music)","level":2,"score":0.4009999930858612},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.36880001425743103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.328000009059906},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C52930066","wikidata":"https://www.wikidata.org/wiki/Q543","display_name":"Censorship","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28619998693466187},{"id":"https://openalex.org/C63969886","wikidata":"https://www.wikidata.org/wiki/Q3536440","display_name":"Internet traffic","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2793999910354614},{"id":"https://openalex.org/C192030150","wikidata":"https://www.wikidata.org/wiki/Q1433061","display_name":"Internet exchange point","level":5,"score":0.275299996137619},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2700999975204468},{"id":"https://openalex.org/C9628104","wikidata":"https://www.wikidata.org/wiki/Q788009","display_name":"Autonomous system (mathematics)","level":2,"score":0.2655999958515167},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C137471899","wikidata":"https://www.wikidata.org/wiki/Q11381","display_name":"Local area network","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3730567.3764449","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764449","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3730567.3764449","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3730567.3764449","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM Internet Measurement Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5244504809379578}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W2051836714","https://openalex.org/W3038565013","https://openalex.org/W4249749069","https://openalex.org/W4320477373","https://openalex.org/W4386365383","https://openalex.org/W4386365438","https://openalex.org/W4398788514","https://openalex.org/W4403981057"],"related_works":[],"abstract_inverted_index":{"Numerous":[0],"disruptions":[1,122,140,151],"to":[2,17,119,132,138,141,164],"Internet":[3,46,121,150,184],"access":[4],"have":[5],"been":[6],"reported":[7],"during":[8],"the":[9,42,60,67,80,91,95,104,108,125,154,165,173],"war":[10,155],"in":[11,98],"Ukraine,":[12],"including":[13],"large-scale":[14],"outages,":[15],"damage":[16],"network":[18],"infrastructure,":[19],"surveillance,":[20],"and":[21,123,129,179],"censorship":[22],"measures.":[23],"However,":[24],"most":[25],"observations":[26],"rely":[27],"on":[28,45,59,66],"local":[29],"reports":[30],"or":[31],"monitoring":[32],"systems":[33],"within":[34],"Ukraine.":[35,57],"In":[36],"this":[37],"paper,":[38],"we":[39,73,115],"investigate":[40],"whether":[41],"conflict's":[43],"impact":[44],"connectivity":[47],"can":[48,156],"be":[49,157],"observed":[50],"externally,":[51],"from":[52],"a":[53,99],"vantage":[54],"point":[55],"outside":[56],"Focusing":[58],"Kherson":[61],"region,":[62],"which":[63],"has":[64],"remained":[65],"frontline":[68],"for":[69],"over":[70],"three":[71,117],"years,":[72],"conduct":[74],"an":[75],"active":[76],"measurement":[77],"campaign":[78],"probing":[79],"Ukrainian":[81],"address":[82,130],"space":[83],"at":[84],"two-hour":[85],"intervals":[86],"since":[87],"March":[88],"2,":[89],"2022,":[90],"7th":[92],"day":[93],"of":[94,107,127,175],"invasion,":[96],"resulting":[97],"country-wide":[100],"dataset":[101],"that":[102,149],"spans":[103],"full":[105],"duration":[106],"conflict.":[109],"Extending":[110],"existing":[111],"outage":[112],"detection":[113],"approaches,":[114],"infer":[116],"signals":[118],"detect":[120],"refine":[124],"mapping":[126],"ASes":[128],"blocks":[131],"specific":[133],"regions.":[134],"This":[135],"allows":[136],"us":[137],"assign":[139],"oblasts":[142],"with":[143],"greater":[144],"confidence.":[145],"Our":[146,167],"results":[147],"demonstrate":[148],"caused":[152],"by":[153,160],"measured":[158],"remotely":[159],"any":[161],"host":[162],"connected":[163],"Internet.":[166],"analysis":[168],"provides":[169],"new":[170],"insights":[171],"into":[172],"resilience":[174],"small":[176],"regional":[177],"providers":[178],"identifies":[180],"periods":[181],"when":[182],"Ukraine's":[183],"infrastructure":[185],"was":[186],"under":[187],"significant":[188],"strain.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-23T05:13:22.807545","created_date":"2025-11-23T00:00:00"}
