{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:36:41Z","timestamp":1753274201298},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621185","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"471-480","source":"Crossref","is-referenced-by-count":2,"title":["CARBINE: Exploring Additional Properties of HyperLogLog for Secure and Robust Flow Cardinality Estimation"],"prefix":"10.1109","author":[{"given":"Damu","family":"Ding","sequence":"first","affiliation":[{"name":"University of Oxford,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3230718.3230729"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2968979"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110257"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref6","first-page":"19","article-title":"Offloading real-time ddos attack detection to programmable data planes","volume-title":"2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"Lapolli"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3116345"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2863942"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3084452"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485998"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073597"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2014-5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2972895"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_55"},{"author":"Collet","key":"ref20","article-title":"xxhash-extremely fast hash algorithm"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00018"},{"volume-title":"CAIDA UCSD Anonymized Internet Traces Dataset -[passive-2016]","year":"2016","key":"ref23"},{"year":"2018","key":"ref24","article-title":"CAIDA UCSD Anonymized Internet Traces Dataset -[passive-2018]"},{"volume-title":"CAIDA UCSD Anonymized Internet Traces Dataset -[passive-2019]","year":"2019","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140298"},{"volume-title":"Volumetric DDoS attacks","year":"2020","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/78922.78925"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948225"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"article-title":"Software defined traffic measurement with OpenSketch","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Yu","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3111328"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.57"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057088"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621185.pdf?arnumber=10621185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:43:22Z","timestamp":1723527802000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621185","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}