{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:31Z","timestamp":1750306831884,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557580","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"135-138","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A modular multi-location anonymized traffic monitoring tool for a WiFi network"],"prefix":"10.1145","author":[{"given":"Justin","family":"Hummel","sequence":"first","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Andrew","family":"McDonald","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Vatsal","family":"Shah","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Riju","family":"Singh","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Bradford D.","family":"Boyle","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Tingshan","family":"Huang","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Nagarajan","family":"Kandasamy","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Harish","family":"Sethu","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Steven","family":"Weber","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"volume-title":"https:\/\/github.com\/DataMap13\/DataMap\/. Accessed","year":"2013","key":"e_1_3_2_2_2_1","unstructured":"DataMap. https:\/\/github.com\/DataMap13\/DataMap\/. Accessed : August 8, 2013 . DataMap. https:\/\/github.com\/DataMap13\/DataMap\/. Accessed: August 8, 2013."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483668"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209212"},{"volume-title":"http:\/\/www.openwips-ng.org\/. Accessed","year":"2013","key":"e_1_3_2_2_8_1","unstructured":"OpenWIPS-ng. http:\/\/www.openwips-ng.org\/. Accessed : August 8, 2013 . OpenWIPS-ng. http:\/\/www.openwips-ng.org\/. Accessed: August 8, 2013."},{"key":"e_1_3_2_2_9_1","volume-title":"The New York Times","author":"Perlroth N.","year":"2012","unstructured":"N. Perlroth . Out-maneuvered at their own game, antivirus makers struggle to adapt . The New York Times , December 31, 2012 . N. Perlroth. Out-maneuvered at their own game, antivirus makers struggle to adapt. The New York Times, December 31, 2012."},{"key":"e_1_3_2_2_10_1","volume-title":"https:\/\/code.google.com\/p\/security-onion\/. Accessed","author":"Onion Security","year":"2013","unstructured":"Security Onion . https:\/\/code.google.com\/p\/security-onion\/. Accessed : August 8, 2013 . Security Onion. https:\/\/code.google.com\/p\/security-onion\/. Accessed: August 8, 2013."},{"volume-title":"http:\/\/www.snort.org\/. Accessed","year":"2013","key":"e_1_3_2_2_11_1","unstructured":"Snort. http:\/\/www.snort.org\/. Accessed : August 8, 2013 . Snort. http:\/\/www.snort.org\/. Accessed: August 8, 2013."},{"key":"e_1_3_2_2_12_1","volume-title":"https:\/\/github.com\/constcast\/vermont\/wiki. Accessed","author":"Nitoring Vermont","year":"2013","unstructured":"Vermont (VERsatile MO Nitoring Toolkit). https:\/\/github.com\/constcast\/vermont\/wiki. Accessed : August 8, 2013 . Vermont (VERsatile MONitoring Toolkit). https:\/\/github.com\/constcast\/vermont\/wiki. Accessed: August 8, 2013."},{"key":"e_1_3_2_2_13_1","volume-title":"Introduction to Computer Networks and Cybersecurity","author":"Wu C.-H.","year":"2013","unstructured":"C.-H. Wu and J. D. Irwin . Introduction to Computer Networks and Cybersecurity . CRC Press , 2013 . C.-H. Wu and J. D. Irwin. Introduction to Computer Networks and Cybersecurity. CRC Press, 2013."}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'14"},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557580","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":13,"alternative-id":["10.1145\/2557547.2557580","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557580","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}