{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T15:14:45Z","timestamp":1769181285761,"version":"3.49.0"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789848","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["Design and Development of Network Monitoring Strategies in P4-enabled Programmable Switches"],"prefix":"10.1109","author":[{"given":"Damu","family":"Ding","sequence":"first","affiliation":[{"name":"University of Oxford,Oxford,United Kingdom"}]},{"given":"Marco","family":"Savi","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca,Department of Informatics, Systems and Communication,Milano,Italy"}]},{"given":"Federico","family":"Pederzolli","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler,Trento,Italy"}]},{"given":"Domenico","family":"Siracusa","sequence":"additional","affiliation":[{"name":"Fondazione Bruno Kessler,Trento,Italy"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8692884"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472826"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3116345"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2968979"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806649"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"ref36","article-title":"Evaluating the Power of Flexible Packet Processing for Network Resource Allocation","author":"sharma","year":"2017","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref35","article-title":"Design and Development of Network Monitoring Strategies in P4-Enabled Programmable Switches","author":"ding","year":"2021","journal-title":"PhD thesis"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073597"},{"key":"ref28","article-title":"Mininet","year":"0"},{"key":"ref27","article-title":"Intel Tofino","year":"0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110257"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505232"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3230718.3230729"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219978"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600030NM"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_87"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869997"},{"key":"ref54","article-title":"G&#x00C9;ANT Network","year":"0"},{"key":"ref53","article-title":"Software Defined Traffic Measurement with OpenSketch","author":"yu","year":"2013","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787497"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_55"},{"key":"ref12","article-title":"An Industrial-scale Software Defined Internet Exchange Point","author":"gupta","year":"2016","journal-title":"Networked Systems Design and Implementation (NSDI)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"ref15","article-title":"NetFlow","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref18","article-title":"FlowRadar: A Better NetFlow for Data Centers","author":"li","year":"2016","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/90.929850"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2758754"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref8","article-title":"Worm Origin Identification Using Random Moonwalks","author":"xie","year":"2005","journal-title":"IEEE Symp on Security and Privacy (SP)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2423675"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref9","article-title":"New Streaming Algorithms for Fast Detection of Superspreaders","author":"venkataraman","year":"2005","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref46","article-title":"Offloading Real-time DDoS Attack Detection to Programmable Data Planes","author":"lapolli","year":"2019","journal-title":"IEEE\/IFIP Symposium on Integrated Network and Service Management (IM)"},{"key":"ref45","article-title":"Network Anomaly Detection Using Parameterized Entropy","author":"berezi?ski","year":"2015","journal-title":"IFIP International Conference on Computer Information Systems and Industrial Management (CISIM)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2005.35"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.112613.132275"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2081490"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330148"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14257\/ijgdc.2014.7.2.02"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","location":"Budapest, Hungary","start":{"date-parts":[[2022,4,25]]},"end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789848.pdf?arnumber=9789848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:20Z","timestamp":1656965420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789848\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789848","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}