{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T04:30:36Z","timestamp":1773117036536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T00:00:00Z","timestamp":1568678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,17]]},"DOI":"10.1145\/3351108.3351129","type":"proceedings-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T12:32:59Z","timestamp":1567513979000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Quantifying the Accuracy of Small Subnet-Equivalent Sampling of IPv4 Internet Background Radiation Datasets"],"prefix":"10.1145","author":[{"given":"Stones Dalitso","family":"Chindipha","sequence":"first","affiliation":[{"name":"Rhodes University, Grahamstown, South Africa"}]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[{"name":"Noroff University College, Kristiansand, Norway"}]},{"given":"Alan","family":"Herbert","sequence":"additional","affiliation":[{"name":"Rhodes University, Grahamstown, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2019,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE","author":"Atifi A."},{"key":"e_1_3_2_1_2_1","volume-title":"Network and Distributed System Security Symposium(NDSS). Internet Society","author":"Bailey Michael","year":"2005"},{"key":"e_1_3_2_1_3_1","unstructured":"Caida. 2017. CAIDA's Annual Report for 2017. Technical Report. Center for Applied Internet Data Analysis (CAIDA) http:\/\/www.caida.org\/home\/about\/annualreports\/2017\/. http:\/\/www.caida.org\/home\/about\/annualreports\/2017\/ Date Accessed: 24 May 2018.  Caida. 2017. CAIDA's Annual Report for 2017. Technical Report. Center for Applied Internet Data Analysis (CAIDA) http:\/\/www.caida.org\/home\/about\/annualreports\/2017\/. http:\/\/www.caida.org\/home\/about\/annualreports\/2017\/ Date Accessed: 24 May 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029627"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378947"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.03.011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETAPPS.2010.50"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"S. O. Hunter B. Irwin and E. Stalmans. 2013. Real-time distributed malicious traffic monitoring for honeypots and network telescopes. In 2013 Information Security for South Africa. IEEE Washington DC USA 1--9.  S. O. Hunter B. Irwin and E. Stalmans. 2013. Real-time distributed malicious traffic monitoring for honeypots and network telescopes. In 2013 Information Security for South Africa. IEEE Washington DC USA 1--9.","DOI":"10.1109\/ISSA.2013.6641050"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2006.03.001"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"B. Irwin. 2012. A network telescope perspective of the Conficker outbreak. In 2012 Information Security for South Africa. IEEE Washington DC USA 1--8.  B. Irwin. 2012. A network telescope perspective of the Conficker outbreak. In 2012 Information Security for South Africa. IEEE Washington DC USA 1--8.","DOI":"10.1109\/ISSA.2012.6320455"},{"key":"e_1_3_2_1_13_1","volume-title":"2013 5th International Conference on Cyber Conflict (CYCON","author":"Irwin B.","year":"2013"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 10th International Conference on Cyber Warfare and Security (ICCWS","author":"Irwin Barry","year":"2015"},{"key":"e_1_3_2_1_15_1","unstructured":"Barry Vivian William Irwin. 2011. A Framework for the Application of Network Telescope Sensors in a Global IP Network. Ph.D. Dissertation. Rhodes University.  Barry Vivian William Irwin. 2011. A Framework for the Application of Network Telescope Sensors in a Global IP Network. Ph.D. Dissertation. Rhodes University."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2015.12.003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ioana Livadariu Ahmed Elmokashfi and Amogh Dhamdhere. 2018. Measuring IPv6 Adoption in Africa. In e-Infrastructure and e-Services for Developing Countries Victor Odumuyiwa Ojo Adegboyega and Charles Uwadia (Eds.). Springer International Publishing Cham 345--351.  Ioana Livadariu Ahmed Elmokashfi and Amogh Dhamdhere. 2018. Measuring IPv6 Adoption in Africa. In e-Infrastructure and e-Services for Developing Countries Victor Odumuyiwa Ojo Adegboyega and Charles Uwadia (Eds.). Springer International Publishing Cham 345--351.","DOI":"10.1007\/978-3-319-98827-6_32"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1029\/WR003i003p00817"},{"key":"e_1_3_2_1_21_1","unstructured":"Oleg Ostashchuk. 2017. Time Series Data Prediction and Analysis. Master's thesis. Czech Technical University in Prague Faculty of Electrical Engineering Department of Computer Science.  Oleg Ostashchuk. 2017. Time Series Data Prediction and Analysis. Master's thesis. Czech Technical University in Prague Faculty of Electrical Engineering Department of Computer Science."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Dean Pemberton. 2007. An Empirical Study of Internet Background Radiation Arrival Density and Network Telescope Sampling Strategies. Ph.D. Dissertation. MSc Thesis School of Mathematics Statistics and Computer Science Victoria \u00e2\u0102\u0119.  Dean Pemberton. 2007. An Empirical Study of Internet Background Radiation Arrival Density and Network Telescope Sampling Strategies. Ph.D. Dissertation. MSc Thesis School of Mathematics Statistics and Computer Science Victoria \u00e2\u0102\u0119.","DOI":"10.1109\/ATNAC.2007.4665254"},{"key":"e_1_3_2_1_24_1","volume-title":"2007 Australasian Telecommunication Networks and Applications Conference. IEEE, Washington DC, USA, 246--252","author":"Pemberton D."},{"key":"e_1_3_2_1_28_1","unstructured":"Internet Society. 2017. State of IPv6 Deployment 2017. Technical Report. Internet Society. https:\/\/www.internetsociety.org\/resources\/doc\/2017\/state-of-ipv6-deployment-2017\/  Internet Society. 2017. State of IPv6 Deployment 2017. Technical Report. Internet Society. https:\/\/www.internetsociety.org\/resources\/doc\/2017\/state-of-ipv6-deployment-2017\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Emmanouil A Varouchakis and Dionissios T Hristopulos. 2013. Improvement of Groundwater Level Prediction in Sparsely Gauged Basins Using Physical Laws and Local Geographic Features as Auxiliary Variables. Advances in water resources 52 (2013) 34--49.  Emmanouil A Varouchakis and Dionissios T Hristopulos. 2013. Improvement of Groundwater Level Prediction in Sparsely Gauged Basins Using Physical Laws and Local Geographic Features as Auxiliary Variables. Advances in water resources 52 (2013) 34--49.","DOI":"10.1016\/j.advwatres.2012.08.002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"e_1_3_2_1_31_1","volume-title":"Recent Advances in Intrusion Detection","author":"Yegneswaran Vinod"}],"event":{"name":"SAICSIT '19: Conference of the South African Institute of Computer Scientists and Information Technologists 2019","location":"Skukuza South Africa","acronym":"SAICSIT '19"},"container-title":["Proceedings of the South African Institute of Computer Scientists and Information Technologists 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351129","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351108.3351129","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:40Z","timestamp":1750202020000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351108.3351129"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,17]]},"references-count":24,"alternative-id":["10.1145\/3351108.3351129","10.1145\/3351108"],"URL":"https:\/\/doi.org\/10.1145\/3351108.3351129","relation":{},"subject":[],"published":{"date-parts":[[2019,9,17]]},"assertion":[{"value":"2019-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}