{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T21:30:12Z","timestamp":1768253412265,"version":"3.49.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/icnp52444.2021.9651974","type":"proceedings-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T16:32:43Z","timestamp":1640709163000},"page":"1-11","source":"Crossref","is-referenced-by-count":13,"title":["Virtual Filter for Non-duplicate Sampling"],"prefix":"10.1109","author":[{"given":"Chaoyi","family":"Ma","sequence":"first","affiliation":[]},{"given":"Haibo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Olufemi O","family":"Odegbile","sequence":"additional","affiliation":[]},{"given":"Shigang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","article-title":"CAIDA UCSD Anonymized 2015 Internet Traces on Jan. 17","year":"2015"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423675"},{"key":"ref32","article-title":"New Streaming Algorithms for Fast Detection of Superspreaders","author":"venkataraman","year":"2005","journal-title":"Proc of NDSS"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637222"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155525"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.882836"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948225"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2753842"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24698-5_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"ref13","article-title":"Finding Frequent Items in Data Streams","author":"charikar","year":"2002","journal-title":"Proc 29th Int Colloquium Automata Languages Program (ICALP)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472845"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2745844.2745870"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3366699"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/78922.78925"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref28","first-page":"4","article-title":"Automated Worm Fingerprinting","volume":"4","author":"singh","year":"2004","journal-title":"OSDI"},{"key":"ref4","article-title":"Cisco IOS NetFlow","year":"0"},{"key":"ref27","first-page":"65","article-title":"An Internet-wide View of Internet-wide Scanning","author":"durumeric","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref3","first-page":"242","article-title":"Worm Origin Identification using Random Moonwalks","author":"xie","year":"2005","journal-title":"Security and Privacy 2005 IEEE Symposium on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref5","article-title":"sFlow Accuracy and Billing","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/90.929850"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447707"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.142"},{"key":"ref21","article-title":"Space Efficient Mining of Multi-graph Streams","author":"cormode","year":"2005","journal-title":"Proc of ACM PODS"},{"key":"ref24","article-title":"Software Defined Traffic Measurement with OpenSketch","author":"yu","year":"2013","journal-title":"Proc of USENIX Symposium on Networked Systems Design and Implementation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2503269"},{"key":"ref26","first-page":"817","article-title":"Bohatei: Flexible and Elastic DDOS Defense","author":"fayaz","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"}],"event":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","location":"Dallas, TX, USA","start":{"date-parts":[[2021,11,1]]},"end":{"date-parts":[[2021,11,5]]}},"container-title":["2021 IEEE 29th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9651731\/9651908\/09651974.pdf?arnumber=9651974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T13:00:06Z","timestamp":1652187606000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9651974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icnp52444.2021.9651974","relation":{},"subject":[],"published":{"date-parts":[[2021,11,1]]}}}