{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:41Z","timestamp":1750308161052,"version":"3.41.0"},"reference-count":12,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2006,10,10]],"date-time":"2006-10-10T00:00:00Z","timestamp":1160438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,10,10]]},"DOI":"10.1145\/1163593.1163601","type":"journal-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:35:32Z","timestamp":1161210932000},"page":"39-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["\"A day in the life of the internet\""],"prefix":"10.1145","volume":"36","author":[{"given":"kc","family":"claffy","sequence":"first","affiliation":[{"name":"University of California, San Diego, CA"}]}],"member":"320","published-online":{"date-parts":[[2006,10,10]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"\"Looking over the Fence at Networks: A Neighbor's View of Networking Research (2001) \" National Academies Press http:\/\/www.nap.edu\/books\/0309076137\/html\/  \"Looking over the Fence at Networks: A Neighbor's View of Networking Research (2001) \" National Academies Press http:\/\/www.nap.edu\/books\/0309076137\/html\/"},{"key":"e_1_2_1_2_1","unstructured":"Internet Measurement Data Catalog (DatCat) http:\/\/www.datcat.org\/  Internet Measurement Data Catalog (DatCat) http:\/\/www.datcat.org\/"},{"key":"e_1_2_1_3_1","unstructured":"\"The Internet Traffic Archive\" http:\/\/ita.ee.lbl.gov\/index.html  \"The Internet Traffic Archive\" http:\/\/ita.ee.lbl.gov\/index.html"},{"key":"e_1_2_1_4_1","unstructured":"\"Community Resource for Archiving Wireless Data at Dartmouth\" http:\/\/crawdad.cs.dartmouth.edu\/  \"Community Resource for Archiving Wireless Data at Dartmouth\" http:\/\/crawdad.cs.dartmouth.edu\/"},{"key":"e_1_2_1_5_1","unstructured":"\"Cluster of European Projects aimed at Monitoring and Measurement -- MoMe Database\" http:\/\/www.ist-mome.org\/database\/  \"Cluster of European Projects aimed at Monitoring and Measurement -- MoMe Database\" http:\/\/www.ist-mome.org\/database\/"},{"key":"e_1_2_1_6_1","unstructured":"\"The Datapository: A collaborative network data analysis and storage facility\" http:\/\/www.datapository.net\/  \"The Datapository: A collaborative network data analysis and storage facility\" http:\/\/www.datapository.net\/"},{"key":"e_1_2_1_7_1","unstructured":"\"Protected Repository of Data for Internet CyberThreats\" http:\/\/www.predict.org\/  \"Protected Repository of Data for Internet CyberThreats\" http:\/\/www.predict.org\/"},{"key":"e_1_2_1_8_1","unstructured":"\"Improving the Integrity of Domain Name System (DNS) Monitoring and Protection\" (NSF grant SCI-0427144)\" http:\/\/www.caida.org\/funding\/dns-itr\/  \"Improving the Integrity of Domain Name System (DNS) Monitoring and Protection\" (NSF grant SCI-0427144)\" http:\/\/www.caida.org\/funding\/dns-itr\/"},{"key":"e_1_2_1_9_1","unstructured":"\"Recommendations for future large scale simultaneous DNS data collections\" http:\/\/www.caida.org\/research\/dns\/dns-itr\/resources\/dnsroot_measurement_recommendations.xml  \"Recommendations for future large scale simultaneous DNS data collections\" http:\/\/www.caida.org\/research\/dns\/dns-itr\/resources\/dnsroot_measurement_recommendations.xml"},{"key":"e_1_2_1_10_1","unstructured":"\"Crypto-PAn: Cryptography-based Prefix-preserving ANonymization\" http:\/\/www.static.cc.gatech.edu\/computing\/Telecomm\/cryptopan\/  \"Crypto-PAn: Cryptography-based Prefix-preserving ANonymization\" http:\/\/www.static.cc.gatech.edu\/computing\/Telecomm\/cryptopan\/"},{"key":"e_1_2_1_11_1","unstructured":"\"The Devil and Packet Trace Anonymization\" http:\/\/www.icir.org\/enterprise-tracing\/papers.html  \"The Devil and Packet Trace Anonymization\" http:\/\/www.icir.org\/enterprise-tracing\/papers.html"},{"key":"e_1_2_1_12_1","unstructured":"\"Toward community-oriented network measurement infrastructure\" http:\/\/www.caida.org\/funding\/cri\/  \"Toward community-oriented network measurement infrastructure\" http:\/\/www.caida.org\/funding\/cri\/"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1163593.1163601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1163593.1163601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:02Z","timestamp":1750263542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1163593.1163601"}},"subtitle":["proposed community-wide experiment"],"short-title":[],"issued":{"date-parts":[[2006,10,10]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2006,10,10]]}},"alternative-id":["10.1145\/1163593.1163601"],"URL":"https:\/\/doi.org\/10.1145\/1163593.1163601","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2006,10,10]]},"assertion":[{"value":"2006-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}