{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T18:10:45Z","timestamp":1759947045202,"version":"build-2065373602"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["62293511","62473260"],"award-info":[{"award-number":["62293511","62473260"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Alibaba Group through Alibaba Innovative Research Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tnsm.2025.3564336","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:56:10Z","timestamp":1746453370000},"page":"4964-4982","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Stateful TCP Performance Profiling With Key Event Capturing"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9302-9011","authenticated-orcid":false,"given":"Ruopeng","family":"Geng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2502-8686","authenticated-orcid":false,"given":"Jianyuan","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Cloud Network, Alibaba Cloud, Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2357-0228","authenticated-orcid":false,"given":"Chongrong","family":"Fang","sequence":"additional","affiliation":[{"name":"Ministry of Education of China, the Shanghai Engineering Research Center of Intelligent Control and Management, and the Department of Automation, Key Laboratory of System Control and Information Processing, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Shaokai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Cloud Network, Alibaba Cloud, Alibaba Group, Hangzhou, China"}]},{"given":"Jiangu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Cloud Network, Alibaba Cloud, Alibaba Group, Hangzhou, China"}]},{"given":"Zhigang","family":"Zong","sequence":"additional","affiliation":[{"name":"Department of Cloud Network, Alibaba Cloud, Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8096-5528","authenticated-orcid":false,"given":"Biao","family":"Lyu","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"given":"Shunmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Cloud Network, Alibaba Cloud, Alibaba Group, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-2162","authenticated-orcid":false,"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3155-3145","authenticated-orcid":false,"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3366693"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013343"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3035761"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3328770"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3405671.3405810"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836094"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190659"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2938500"},{"article-title":"Linux kernel Version6.5, net\/ipv4\/tcp*.c","year":"2023","author":"Torvalds","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957002"},{"key":"ref15","first-page":"1","article-title":"Profiling network performance for multi-tier data Center applications","volume-title":"Proc. NSDI","author":"Yu"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2018602.2018615"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934884"},{"year":"2022","key":"ref18","article-title":"eBPF"},{"year":"2021","key":"ref19","article-title":"SystemTap"},{"year":"2016","key":"ref20","article-title":"TCP probe"},{"year":"2008","key":"ref21","article-title":"Ftrace"},{"year":"2017","key":"ref22","article-title":"Tcpdump"},{"year":"2020","key":"ref23","article-title":"qlogtcp"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3404868.3406663"},{"key":"ref25","first-page":"437","article-title":"DETER: Deterministic TCP replay for performance diagnosis","volume-title":"Proc. NSDI","author":"Li"},{"year":"2023","key":"ref26","article-title":"tracepoints"},{"year":"2022","key":"ref27","article-title":"Kprobes"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP52444.2021.9651912"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3174138"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3158644"},{"key":"ref32","first-page":"1","article-title":"Hybrid slow start for high-bandwidth and longdistance networks","volume-title":"Proc. PFLDnet","author":"Ha"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"volume-title":"MQTT Essentials\u2014A Lightweight IoT Protocol","year":"2017","author":"Hillar","key":"ref34"},{"volume-title":"RabbitMQ Essentials","year":"2014","author":"Dossot","key":"ref35"},{"article-title":"Slipping in the window: TCP reset attacks","year":"2004","author":"Watson","key":"ref36"},{"year":"2021","key":"ref37","article-title":"Hey"},{"year":"2021","key":"ref38","article-title":"TC"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050228"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.04.010"},{"key":"ref41","first-page":"1","article-title":"Deterministic network emulation using KauNetEm","volume-title":"Proc. Netdev 1.1 Tech. Conf. Linux Netw.","author":"Garcia"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107289"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2481394"},{"volume-title":"Early retransmit for TCP and stream control transmission protocol (SCTP)","year":"2010","author":"Blanton","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2886282"},{"key":"ref46","first-page":"1","article-title":"FTProfiler: A new profiling tool for GridFTP servers","volume-title":"Proc. Int. Conf. Parallel Distrib. Process. Techn. Appl.","author":"Luu"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.10.002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3411029.3411036"},{"key":"ref49","first-page":"213","article-title":"PacketDrill: Scriptable network stack testing, from sockets to packets","volume-title":"Proc. ATC","author":"Cardwell"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422949"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3171594"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3327508"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3150928.3150957"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11194281\/10982519.pdf?arnumber=10982519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:38:35Z","timestamp":1759945115000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10982519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":53,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3564336","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}