{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T19:14:29Z","timestamp":1760728469625,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032052902"},{"type":"electronic","value":"9783032052919"}],"license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05291-9_6","type":"book-chapter","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T14:08:15Z","timestamp":1758722895000},"page":"144-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The C++ Actor Framework: A Scalable Fundament for\u00a0Research and\u00a0Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2192-3122","authenticated-orcid":false,"given":"Dominik","family":"Charousset","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1676-8108","authenticated-orcid":false,"given":"Raphael","family":"Hiesgen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0956-7885","authenticated-orcid":false,"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"6_CR1","unstructured":"Academy Software Foundation: xStudio. GitHub. https:\/\/www.dneg.com\/xstudio\/. code at https:\/\/github.com\/AcademySoftwareFoundation\/xstudio"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Agha, G.: Actors: A Model of Concurrent Computation In Distributed Systems. MIT Press, Cambridge (1986)","DOI":"10.7551\/mitpress\/1086.001.0001"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/BFb0084816","volume-title":"CONCUR \u201992","author":"G Agha","year":"1992","unstructured":"Agha, G., Mason, I.A., Smith, S., Talcott, C.: Towards a theory of actor computation. In: Cleaveland, W.R. (ed.) CONCUR 1992. LNCS, vol. 630, pp. 565\u2013579. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0084816"},{"key":"6_CR4","unstructured":"Alcock, S., WAND: libtrace. GitHub. https:\/\/github.com\/LibtraceTeam\/libtrace"},{"key":"6_CR5","unstructured":"Antonakakis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110. USENIX Association, Vancouver (2017)"},{"key":"6_CR6","unstructured":"Armstrong, J.: Making reliable distributed systems in the presence of software errors. Ph.D. thesis, Department of Microelectronics and Information Technology, KTH, Sweden (2003)"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Baccelli, E., et al.: RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J. 5(6), 4428\u20134440 (2018). https:\/\/doi.org\/10.1109\/JIOT.2018.2815038","DOI":"10.1109\/JIOT.2018.2815038"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Bensley, S., Thaler, D., Balasubramanian, P., Eggert, L., Judd, G.: Data Center TCP (DCTCP): TCP Congestion Control for Data Centers. RFC\u00a08257, IETF (2017). https:\/\/doi.org\/10.17487\/RFC8257","DOI":"10.17487\/RFC8257"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Birrell, A., Evers, D., Nelson, G., Owicki, S., Wobber, T.: Distributed Garbage Collection for Network Objects. Technical report, Systems Research Center (1993). http:\/\/birrell.org\/andrew\/papers\/116-NetObjGC.pdf","DOI":"10.1145\/168619.168637"},{"key":"6_CR10","unstructured":"Casado, M., Garfinkel, T., Cui, W., Paxson, V., Savage, S.: Opportunistic measurement: extracting insight from spurious traffic. In: Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV) (2005)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Charousset, D., Hiesgen, R., Schmidt, T.C.: CAF - The C++ actor framework for scalable and resource-efficient applications. In: Proceedings of the 5th ACM SIGPLAN Conference on Systems, Programming, and Applications (SPLASH \u201914), Workshop AGERE!, pp. 15\u201328. ACM, New York (2014)","DOI":"10.1145\/2687357.2687363"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Charousset, D., Hiesgen, R., Schmidt, T.C.: Revisiting actor programming in C++. Comput. Lang. Syst. Struct. 45, 105\u2013131 (2016). https:\/\/doi.org\/10.1016\/j.cl.2016.01.002","DOI":"10.1016\/j.cl.2016.01.002"},{"key":"6_CR13","unstructured":"Charousset, D., Schmidt, T.C.: libcppa - designing an actor semantic for C++11. In: Proceedings of C++Now (2013). http:\/\/arxiv.org\/abs\/1301.0748"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Charousset, D., Schmidt, T.C., Hiesgen, R., W\u00e4hlisch, M.: Native actors \u2013 a scalable software platform for distributed, heterogeneous environments. In: Proceedings of the 4rd ACM SIGPLAN Conference on Systems, Programming, and Applications (SPLASH \u201913), Workshop AGERE!, pp. 87\u201396. ACM, New York (2013)","DOI":"10.1145\/2541329.2541336"},{"key":"6_CR15","unstructured":"Cisco Talos: Threat Advisory: Critical Apache Log4j vulnerability being exploited in the wild (2022). https:\/\/blog.talosintelligence.com\/2021\/12\/apache-log4j-rce-vulnerability.html"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Clebsch, S., Franco, J., Drossopoulou, S., Yang, A.M., Wrigstad, T., Vitek, J.: Orca: GC and type system co-design for actor languages. Proc. of the ACM on Program. Lang. 1(OOPSLA), 1\u201328 (2017). https:\/\/doi.org\/10.1145\/3133896","DOI":"10.1145\/3133896"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., et al.: The matter of heartbleed. In: Proceedings of ACM IMC, pp. 475\u2013488. ACM, New York (2014)","DOI":"10.1145\/2663716.2663755"},{"key":"6_CR18","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.: ZMap: fast internet-wide scanning and its security applications. In: In Proceedings of the 22nd USENIX Security Symposium, pp. 605\u2013620 (08 2013)"},{"key":"6_CR19","unstructured":"Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence. In: Proceedings of the 3rd IJCAI, pp. 235\u2013245. Morgan Kaufmann Publishers Inc., San Francisco (1973)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Hiesgen, R., Charousset, D., Schmidt, T.C.: Embedded actors \u2013 towards distributed programming in the IoT. In: Proceedings of the 4th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin\u201914, , pp. 371\u2013375. IEEE Press, Piscataway (2014)","DOI":"10.1109\/ICCE-Berlin.2014.7034296"},{"key":"6_CR21","doi-asserted-by":"publisher","unstructured":"Hiesgen, R., Charousset, D., Schmidt, T.C.: A configurable transport layer for CAF. In: Proceedings of the 9th ACM SIGPLAN Conference on Systems, Programming, and Applications (SPLASH \u201918), Workshop AGERE!, pp. 1\u201312. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3281366.3281369","DOI":"10.1145\/3281366.3281369"},{"key":"6_CR22","unstructured":"Hiesgen, R., Charousset, D., Schmidt, T.C., W\u00e4hlisch, M.: Programming actors for the internet of things. Ercim News 101, 25\u201326 (2015). http:\/\/ercim-news.ercim.eu\/en101\/special\/programming-actors-for-the-internet-of-things"},{"key":"6_CR23","unstructured":"Hiesgen, R., Nawrocki, M., King, A., Dainotti, A., Schmidt, T.C., W\u00e4hlisch, M.: Spoki: unveiling a new wave of scanners through a reactive network telescope. In: Proceedings of 31st USENIX Security Symposium, pp. 431\u2013448. USENIX Association, Berkeley (2022). https:\/\/www.usenix.org\/system\/files\/sec22-hiesgen.pdf"},{"key":"6_CR24","unstructured":"Hiesgen, R., Nawrocki, M., Schmidt, T.C., W\u00e4hlisch, M.: The race to the vulnerable: measuring the log4j shell incident. In: Proceedings of Network Traffic Measurement and Analysis Conference (TMA), pp.\u00a01\u20139. IFIP, Laxenburg (2022). https:\/\/tma.ifip.org\/2022\/wp-content\/uploads\/sites\/11\/2022\/06\/tma2022-paper40.pdf"},{"issue":"6","key":"6_CR25","doi-asserted-by":"publisher","first-page":"5921","DOI":"10.1109\/TNSM.2024.3440188","volume":"21","author":"R Hiesgen","year":"2024","unstructured":"Hiesgen, R., Nawrocki, M., Schmidt, T.C., W\u00e4hlisch, M.: The Log4j incident: a comprehensive measurement study of a critical vulnerability. IEEE Trans. Netw. Serv. Manag. (TNSM) 21(6), 5921\u20135934 (2024). https:\/\/doi.org\/10.1109\/TNSM.2024.3440188","journal-title":"IEEE Trans. Netw. Serv. Manag. (TNSM)"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Iyengar, J., Thomson, M.: QUIC: A UDP-Based Multiplexed and Secure Transport. RFC\u00a09000, IETF (2021). https:\/\/doi.org\/10.17487\/RFC9000. https:\/\/doi.org\/10.17487\/RFC9000","DOI":"10.17487\/RFC9000"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Kocher, P., et al.: Spectre attacks: exploiting speculative execution. Commun. ACM 63(7), 93\u2013101 (2020)","DOI":"10.1145\/3399742"},{"key":"6_CR28","unstructured":"Luckie, M.: Scamper. website. https:\/\/www.caida.org\/catalog\/software\/scamper\/"},{"key":"6_CR29","unstructured":"Matthew Prince (Cloudflare): (2022). https:\/\/twitter.com\/eastdakota\/status\/1469800951351427073"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Otto, J., Hiesgen, R., Charousset, D., Schmidt, T.C.: Revisiting the network stack in CAF. In: Proceedings of the 11th ACM SIGPLAN Conference on Systems, Programming, and Applications (SPLASH \u201920), Workshop AGERE!, pp.\u00a01\u20139. ACM, New York (2020). https:\/\/doi.org\/10.1145\/3427760.3428340","DOI":"10.1145\/3427760.3428340"},{"issue":"23\u201324","key":"6_CR31","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Plyukhin, D., Agha, G.: A scalable algorithm for decentralized actor termination detection. Log. Methods Comput. Sci. 18(1) (2022). https:\/\/doi.org\/10.46298\/lmcs-18(1:39)2022","DOI":"10.46298\/lmcs-18(1:39)2022"},{"key":"6_CR33","unstructured":"ReactiveX: An API for asynchronous programming with observable streams. website. https:\/\/reactivex.io"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Rinaldi, L., Torquati, M., Mencagli, G., Danelutto, M., Menga, T.: Accelerating actor-based applications with parallel patterns. In: 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, pp. 140\u2013147 (2019)","DOI":"10.1109\/EMPDP.2019.8671602"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC\u00a07252, IETF (2014). https:\/\/doi.org\/10.17487\/RFC7252. https:\/\/doi.org\/10.17487\/RFC7252","DOI":"10.17487\/RFC7252"},{"key":"6_CR36","unstructured":"The MITRE Corporation: CVE-2014-0160 (2022). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-0160"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Torquati, M., Menga, T., Matteis, T.D., Sensi, D.D., Mencagli, G.: Reducing message latency and CPU utilization in the CAF actor framework. In: 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2018, pp. 145\u2013153. IEEE Computer Society, Washington (2018)","DOI":"10.1109\/PDP2018.2018.00028"},{"key":"6_CR38","unstructured":"Triebe, M., Charousset, D., Hiesgen, R., Schmidt, T.C.: Das C++ Actor Framework im Leistungsvergleich. In: Report 302, 8. GI\/ITG Workshop Leistungs-, Zuverl\u00e4ssigkeits- und Verl\u00e4sslichkeitsbewertung von Kommunikationsnetzen und verteilten Systemen (MMBnet15), pp. 83\u201389. Universit\u00e4t Hamburg, Dept. Informatik, Hamburg (2015)"},{"key":"6_CR39","unstructured":"Vallentin, M., Paxson, V., Sommer, R.: VAST: a unified platform for interactive network forensics. In: Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2016)"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"W\u00f6lke, S., Hiesgen, R., Charousset, D., Schmidt, T.C.: Locality-guided scheduling in CAF. In: Proceedings of the 8th ACM SIGPLAN Conference on Systems, Programming, and Applications (SPLASH \u201917), Workshop AGERE!, pp. 11\u201320. ACM, New York (2017)","DOI":"10.1145\/3141834.3141836"}],"container-title":["Lecture Notes in Computer Science","Concurrent Programming, Open Systems and Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05291-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T18:32:35Z","timestamp":1760725955000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05291-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"ISBN":["9783032052902","9783032052919"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05291-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"25 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}