{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:40:15Z","timestamp":1756532415116,"version":"3.44.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133873","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Direct Feature Access - Scaling Network Traffic Feature Collection to Terabit Speed"],"prefix":"10.1109","author":[{"given":"Lukas","family":"Froschauer","sequence":"first","affiliation":[{"name":"Faculty of Applied Computer Science Deggendorf Institute of Technology,Deggendorf,Germany"}]},{"given":"Jonatan","family":"Langlet","sequence":"additional","affiliation":[{"name":"EECS and Digital Futures KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Andreas","family":"Kassler","sequence":"additional","affiliation":[{"name":"Faculty of Applied Computer Science Deggendorf Institute of Technology,Deggendorf,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3382393"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR52026.2021.9481849"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00770-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"article-title":"pForest: In-Network Inference with Random Forests","year":"2022","author":"Busse-Grawitz","key":"ref8"},{"article-title":"IIsy: Practical In-Network Classification","year":"2022","author":"Zheng","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604827"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987459"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486321"},{"author":"Corporation","key":"ref14","article-title":"1. Overview \u2014 GPUDirect RDMA 12.8 documentation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3212913"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472846"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3349611.3355549"},{"key":"ref20","first-page":"311","article-title":"FlowRadar: A better NetFlow for data centers","volume-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation","author":"Li"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3099442"},{"key":"ref23","first-page":"1027","article-title":"Toward Nearly-Zero-Error sketching via compressive sensing","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Huang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14778\/3467861.3467868"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3626775"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet47604.2019.9064137"},{"article-title":"In-band network telemetry via programmable dataplanes","volume-title":"Proc. ACM SIGCOMM 2015","author":"Kim","key":"ref28"},{"key":"ref29","first-page":"991","article-title":"LightGuardian: A Full-Visibility, lightweight, in-band telemetry system using sketchlets","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21)","author":"Zhao"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"year":"2019","key":"ref31","article-title":"Explore model-driven telemetry"},{"year":"2021","key":"ref32","article-title":"Overview of the junos telemetry interface"},{"year":"2020","key":"ref33","article-title":"Telemetry report format specification"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086704"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"ref37","first-page":"607","article-title":"Subverting website fingerprinting defenses with robust traffic representation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Shen"},{"year":"2023","key":"ref38","article-title":"DCS801 (Wedge100BF-32QS) DS R05"},{"year":"2022","key":"ref39","article-title":"T-Rex"},{"key":"ref40","article-title":"Intel\u00ae P4 Insight Tool"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2025,8,4]]},"location":"Tokyo, Japan","end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133873.pdf?arnumber=11133873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:14:20Z","timestamp":1756530860000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133873","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}