{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:43Z","timestamp":1750308823458,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,7]],"date-time":"2009-11-07T00:00:00Z","timestamp":1257552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,7]]},"DOI":"10.1145\/1641587.1641591","type":"proceedings-article","created":{"date-parts":[[2009,11,11]],"date-time":"2009-11-11T13:02:08Z","timestamp":1257944528000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Network stack diagnosis and visualization tool"],"prefix":"10.1145","author":[{"given":"Krist","family":"Wongsuphasawat","sequence":"first","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Pornpat","family":"Artornsombudh","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Bao","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]},{"given":"Justin","family":"McCann","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD"}]}],"member":"320","published-online":{"date-parts":[[2009,11,7]]},"reference":[{"volume-title":"http:\/\/code.google.com\/p\/assql\/ (Jul","year":"2009","key":"e_1_3_2_2_1_1","unstructured":"assql. http:\/\/code.google.com\/p\/assql\/ (Jul 2009 ). assql. http:\/\/code.google.com\/p\/assql\/ (Jul 2009)."},{"key":"e_1_3_2_2_2_1","volume-title":"http:\/\/bb4.com (Sep","author":"Big","year":"2009","unstructured":"Big brother. http:\/\/bb4.com (Sep 2009 ). Big brother. http:\/\/bb4.com (Sep 2009)."},{"key":"e_1_3_2_2_3_1","volume-title":"http:\/\/cricket.sourceforge.net (Sep","author":"Cricket","year":"2009","unstructured":"Cricket . http:\/\/cricket.sourceforge.net (Sep 2009 ). Cricket. http:\/\/cricket.sourceforge.net (Sep 2009)."},{"key":"e_1_3_2_2_4_1","volume-title":"http:\/\/munin.projects.linpro.no (Sep","author":"Munin","year":"2009","unstructured":"Munin . http:\/\/munin.projects.linpro.no (Sep 2009 ). Munin. http:\/\/munin.projects.linpro.no (Sep 2009)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023724"},{"key":"e_1_3_2_2_6_1","volume-title":"Proc. Annual ACM Workshop on Hot Topics in Networks (HotNets)","author":"Bahl P.","year":"2005","unstructured":"Bahl , P. , Padhye , J. , Ravindranath , L. , Singh , M. , Wolman , A. , and Zill , B . DAIR: A framework for managing enterprise wireless networks using desktop infrastructure . In Proc. Annual ACM Workshop on Hot Topics in Networks (HotNets) ( 2005 ). Bahl, P., Padhye, J., Ravindranath, L., Singh, M., Wolman, A., and Zill, B. DAIR: A framework for managing enterprise wireless networks using desktop infrastructure. In Proc. Annual ACM Workshop on Hot Topics in Networks (HotNets) (2005)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029217"},{"key":"e_1_3_2_2_8_1","volume-title":"USA","author":"Barth W.","year":"2006","unstructured":"Barth , W. Nagios : System and network monitoring. No Starch Press San Francisco, CA , USA , 2006 . Barth, W. Nagios: System and network monitoring. No Starch Press San Francisco, CA, USA, 2006."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.468391"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85933-8_12"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134702"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282384"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159920"},{"key":"e_1_3_2_2_14_1","first-page":"1","volume-title":"USENIX Ann. Tech. Conf.","author":"Cheswick B.","year":"2000","unstructured":"Cheswick , B. , Burch , H. , and Branigan , S . Mapping and visualizing the internet . In USENIX Ann. Tech. Conf. ( 2000 ), pp. 1 -- 12 . Cheswick, B., Burch, H., and Branigan, S. Mapping and visualizing the internet. In USENIX Ann. Tech. Conf. (2000), pp. 1--12."},{"key":"e_1_3_2_2_15_1","volume-title":"http:\/\/www.wireshark.org (July","author":"Combs G.","year":"2009","unstructured":"Combs , G. , Wireshark . http:\/\/www.wireshark.org (July 2009 ). Combs, G., et al. Wireshark. http:\/\/www.wireshark.org (July 2009)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-4459-z"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080151"},{"key":"e_1_3_2_2_18_1","first-page":"18","volume-title":"Proc. 19th Conf. Large Installation System Administration","volume":"19","author":"Kim S.","year":"2005","unstructured":"Kim , S. , and Reddy , A . Netviewer: a network traffic visualization and analysis tool . In Proc. 19th Conf. Large Installation System Administration ( 2005 ), vol. 19 , USENIX Association Berkeley, CA, USA , pp. 18 -- 18 . Kim, S., and Reddy, A. Netviewer: a network traffic visualization and analysis tool. In Proc. 19th Conf. Large Installation System Administration (2005), vol. 19, USENIX Association Berkeley, CA, USA, pp. 18--18."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029208.1029220"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956990"},{"key":"e_1_3_2_2_21_1","volume-title":"Wireshark&amp;Ethereal network protocol analyzer toolkit","author":"Orebaugh A.","year":"2007","unstructured":"Orebaugh , A. , Ramirez , G. , and Burke , J . Wireshark&amp;Ethereal network protocol analyzer toolkit . Syngress Publishing , 2007 . Orebaugh, A., Ramirez, G., and Burke, J. Wireshark&amp;Ethereal network protocol analyzer toolkit. Syngress Publishing, 2007."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080182"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/832277.834354"},{"key":"e_1_3_2_2_24_1","volume-title":"International Conference on Informatics","author":"Tehsin S.","year":"2007","unstructured":"Tehsin , S. , Khan , S. , and Khattak , N . Visualizing Network Traffic as Images for Network Anomaly Detection . In International Conference on Informatics ( 2007 ). Tehsin, S., Khan, S., and Khattak, N. Visualizing Network Traffic as Images for Network Anomaly Detection. In International Conference on Informatics (2007)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1708-8240.1996.tb00893.x"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861384"},{"key":"e_1_3_2_2_27_1","volume-title":"Understanding internet routing anomalies and building robust transport layer protocols. Tech. rep","author":"Zhang M.","year":"2005","unstructured":"Zhang , M. Understanding internet routing anomalies and building robust transport layer protocols. Tech. rep ., Princeton University , 2005 . Zhang, M. Understanding internet routing anomalies and building robust transport layer protocols. Tech. rep., Princeton University, 2005."}],"event":{"name":"CHiMiT '09: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","USENIX Assoc USENIX Assoc"],"location":"Baltimore Maryland","acronym":"CHiMiT '09"},"container-title":["Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641587.1641591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1641587.1641591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:48Z","timestamp":1750278408000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641587.1641591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,7]]},"references-count":27,"alternative-id":["10.1145\/1641587.1641591","10.1145\/1641587"],"URL":"https:\/\/doi.org\/10.1145\/1641587.1641591","relation":{},"subject":[],"published":{"date-parts":[[2009,11,7]]},"assertion":[{"value":"2009-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}