{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:14:26Z","timestamp":1771373666207,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T00:00:00Z","timestamp":1638748800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,6]]},"DOI":"10.1109\/sds54264.2021.9732164","type":"proceedings-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T20:53:40Z","timestamp":1647550420000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Can the User Help? Leveraging User Actions for Network Profiling"],"prefix":"10.1109","author":[{"given":"Zorigtbaatar","family":"Chuluundorj","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute,Computer Science Department,Worcester,MA,USA"}]},{"given":"Curtis R.","family":"Taylor","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory,Oak Ridge,TN,USA"}]},{"given":"Robert J.","family":"Walls","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute,Computer Science Department,Worcester,MA,USA"}]},{"given":"Craig A.","family":"Shue","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute,Computer Science Department,Worcester,MA,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21031-0_26"},{"key":"ref12","first-page":"20","article-title":"Bridging the host-network divide: Survey, taxonomy, and solution","author":"fink","year":"0","journal-title":"USENIX 21st Large Installation System Administration conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23076"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76929-3_21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151033"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595683"},{"key":"ref18","author":"ramel","year":"0","journal-title":"Stack overflow Old net framework usage still beats &#x2018;most loved&#x2019; net core\/ net 5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622213"},{"key":"ref4","first-page":"18","article-title":"Improving host security with system call policies","author":"provos","year":"2003","journal-title":"USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-980109"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"ref8","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"USENIX NSDI"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866353"},{"key":"ref1","first-page":"327","article-title":"Identifying user behavior by analyzing web server access log file","volume":"9","author":"suneetha","year":"2009","journal-title":"IJCSNS Journal of Computer Science and Network Security"},{"key":"ref9","article-title":"BINDER: An extrusion-based break-in detector for personal computers","author":"cui","year":"2005","journal-title":"USENIX ATC"},{"key":"ref20","article-title":"Top websites","year":"0","journal-title":"Quantcast"},{"key":"ref21","article-title":"Top sites","year":"0","journal-title":"Alexa Internet Inc"}],"event":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","location":"Gandia, Spain","start":{"date-parts":[[2021,12,6]]},"end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 Eighth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9732059\/9731847\/09732164.pdf?arnumber=9732164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:20:41Z","timestamp":1657333241000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9732164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/sds54264.2021.9732164","relation":{},"subject":[],"published":{"date-parts":[[2021,12,6]]}}}