{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:24:33Z","timestamp":1760711073447,"version":"3.37.3"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1533644"],"award-info":[{"award-number":["CCF-1533644"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1109\/hpec55821.2022.9926332","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:40:48Z","timestamp":1667526048000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["GraphBLAS on the Edge: Anonymized High Performance Streaming of Network Traffic"],"prefix":"10.1109","author":[{"given":"Michael","family":"Jones","sequence":"first","affiliation":[{"name":"MIT"}]},{"given":"Jeremy","family":"Kepner","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Daniel","family":"Andersen","sequence":"additional","affiliation":[{"name":"CAIDA"}]},{"given":"Aydin","family":"Buluc","sequence":"additional","affiliation":[{"name":"LBNL"}]},{"given":"Chansup","family":"Byun","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"K","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA"}]},{"given":"Timothy","family":"Davis","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M"}]},{"given":"William","family":"Arcand","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Jonathan","family":"Bernays","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"David","family":"Bestor","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"William","family":"Bergeron","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Vijay","family":"Gadepally","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Micheal","family":"Houle","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Matthew","family":"Hubbell","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Hayden","family":"Jananthan","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Anna","family":"Klein","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Chad","family":"Meiners","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Lauren","family":"Milechin","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Julie","family":"Mullen","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Sandeep","family":"Pisharody","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Andrew","family":"Prout","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Albert","family":"Reuther","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Antonio","family":"Rosa","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Siddharth","family":"Samsi","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Jon","family":"Sreekanth","sequence":"additional","affiliation":[{"name":"Accolade Technology"}]},{"given":"Doug","family":"Stetson","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Charles","family":"Yee","sequence":"additional","affiliation":[{"name":"MIT"}]},{"given":"Peter","family":"Michaleas","sequence":"additional","affiliation":[{"name":"MIT"}]}],"member":"263","reference":[{"volume-title":"Cisco Visual Networking Index: Forecast and Trends","key":"ref1"},{"volume-title":"Cisco Visual Networking Index: Forecast and Trends, 2018\u20132023","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.7551\/mitpress\/10190.001.0001"},{"key":"ref4","first-page":"559","article-title":"Ancient mantineia\u2019s defence network reconsidered through a gis approach","volume":"1016","author":"Topouzi","year":"2002","journal-title":"BAR INTERNATIONAL SERIES"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1186\/s43238-021-00042-w"},{"volume-title":"The \u2018guardian of the pontifical state\u2019: structural assessment of a damaged coastal watchtower in south lazio","year":"2010","author":"Cacciotti","key":"ref6"},{"volume-title":"Three Steps to Victory: A Personal Account by Radar\u2019s Greatest Pioneer","year":"1957","author":"Watson-Watt","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.2307\/2538986"},{"key":"ref9","article-title":"Modelling and assessment of the current and future space surveillance network","author":"Geul","year":"2017","journal-title":"7th ECSD"},{"issue":"2","key":"ref10","first-page":"140","article-title":"Radar development for air and missile defense","volume":"34","author":"O\u2019Haver","year":"2018","journal-title":"Johns Hopkins APL Tech. Digest"},{"volume-title":"CAIDA Anonymized Internet Traces Dataset (April 2008 - January 2019)","key":"ref11"},{"volume-title":"UCSD Network Telescope","key":"ref12"},{"volume-title":"Global Cyber Alliance","key":"ref13"},{"volume-title":"Greynoise","key":"ref14"},{"volume-title":"MAWI Working Group Traffic Archive","key":"ref15"},{"volume-title":"Shadowserver Foundation","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/HPEC43674.2020.9286235"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/4236.815868"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.jnca.2012.12.020"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MIC.2016.80"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3402413.3402421"},{"key":"ref22","article-title":"Zero botnets: An observe-pursue-counter approach","volume":"6","author":"Kepner","year":"2021","journal-title":"Belfer Center Reports"},{"volume-title":"Beyond zero trust: Reclaiming blue cyberspace","year":"2022","author":"Weed","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1137\/1.9780898719918"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.procs.2015.05.353"},{"key":"ref26","first-page":"1","article-title":"Math-ematical foundations of the graphblas","volume-title":"2016 IEEE High Performance Extreme Computing Conference (HPEC)","author":"Kepner"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/IPDPSW.2017.117"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/HPEC.2017.8091098"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3225058.3225122"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/3322125"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/10617.001.0001","volume-title":"Mathematics of big data: Spreadsheets, databases, matrices, and graphs","author":"Kepner","year":"2018"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3322125"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/IPDPSW.2019.00053"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/IPDPSW.2019.00054"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/HPEC.2019.8916550"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1137\/1.9781611976229.14"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/IPDPSW52791.2021.00047"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/HPEC49654.2021.9622789"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/IPDPSW50202.2020.00046"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/HPEC49654.2021.9622790"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/HPEC.2019.8916263"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1201\/9781003033707-13"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/IPDPSW52791.2021.00051"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/1787275.1787296"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1147\/JRD.2018.2846958"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/HPEC.2019.8916559"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.14778\/3384345.3384358"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/IISWC50251.2020.00029"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.3390\/a14080221"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1177\/10943420211029299"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/HPEC49654.2021.9622824"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1145\/3442202"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/TPDS.2021.3094091"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.14778\/3484224.3484238"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref56","article-title":"Bro: An open source network intrusion detection system","volume-title":"Security, E-learning, E-Services","volume":"17","author":"Sommer","year":"2003"},{"volume-title":"pmacct: steps forward interface counters","year":"2008","author":"Lucente","key":"ref57"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"ref59","first-page":"125","article-title":"Measuring sparseness of noisy signals","volume-title":"4th International Symposium on Independent Component Analysis and Blind Signal Separation","author":"Karvanen"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1145\/1005686.1005698"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/TNET.2005.857115"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1126\/science.1184819"},{"key":"ref63","first-page":"1","article-title":"Internet traffic matrices: A primer","volume":"1","author":"Tune","year":"2013","journal-title":"Recent Advances in Networking"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1109\/HPEC.2019.8916508"},{"key":"ref65","article-title":"The fundamentals of heavy tails: Properties, emergence, and estimation","author":"Nair","year":"2020","journal-title":"Preprint, California Institute of Technology"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.14778\/2824032.2824098"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1145\/3183713.3196909"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1109\/ICASSP40776.2020.9053419"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/HPEC49654.2021.9622839"},{"volume-title":"Pthreads programming","year":"1996","author":"Nichols","key":"ref70"}],"event":{"name":"2022 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2022,9,19]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2022,9,23]]}},"container-title":["2022 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9926284\/9926287\/09926332.pdf?arnumber=9926332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T06:07:36Z","timestamp":1706076456000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9926332\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/hpec55821.2022.9926332","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]}}}