{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T08:20:19Z","timestamp":1766564419758,"version":"3.48.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T00:00:00Z","timestamp":1764115200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,26]]},"DOI":"10.1109\/itnac66378.2025.11302763","type":"proceedings-article","created":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:29:50Z","timestamp":1766514590000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Private Ethereum Testbed for Network Traffic Dataset Collection"],"prefix":"10.1109","author":[{"given":"Zubaida","family":"Rehman","sequence":"first","affiliation":[{"name":"RMIT University,School of Computing Technologies,Melbourne,Australia"}]},{"given":"Mark A.","family":"Gregory","sequence":"additional","affiliation":[{"name":"RMIT University,School of Engineering,Melbourne,Australia"}]},{"given":"Iqbal","family":"Gondal","sequence":"additional","affiliation":[{"name":"RMIT University,School of Computing Technologies,Melbourne,Australia"}]},{"given":"Hai","family":"Dong","sequence":"additional","affiliation":[{"name":"RMIT University,School of Computing Technologies,Melbourne,Australia"}]},{"given":"Mengmeng","family":"Ge","sequence":"additional","affiliation":[{"name":"Monash University,Melbourne,Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_23"},{"key":"ref2","first-page":"129","article-title":"Eclipse attacks on {Bitcoin\u2019s} {peer-to-peer] network","volume-title":"24th USENIX security symposium (USENIX security 15","author":"Heilman"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC64466.2025.11114523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101604"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24465"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13467"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3538837"},{"year":"2020","key":"ref10","article-title":"Ethereum wireshark dissectors"},{"year":"2021","key":"ref11","article-title":"Ethereum devp.2p wireshark dissector"},{"key":"ref12","article-title":"Eclipse attack detection on a blockchain network as a non-parametric change detection problem","author":"Gupta","year":"2024","journal-title":"arXiv preprint arXiv:2404.00538"}],"event":{"name":"2025 IEEE 35th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2025,11,26]]},"location":"ChristChurch, New Zealand","end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 IEEE 35th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11302406\/11302510\/11302763.pdf?arnumber=11302763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T07:02:06Z","timestamp":1766559726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11302763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,26]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/itnac66378.2025.11302763","relation":{},"subject":[],"published":{"date-parts":[[2025,11,26]]}}}