{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:30Z","timestamp":1772164110458,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Comcast Tech Research Grant"},{"name":"ANR","award":["ANR-21-CE94-0001-01"],"award-info":[{"award-number":["ANR-21-CE94-0001-01"]}]},{"name":"France and Chicago Collaborating in the Sciences"},{"name":"NSF","award":["CNS-2124393, CNS-1704077, CNS-2126327"],"award-info":[{"award-number":["CNS-2124393, CNS-1704077, CNS-2126327"]}]},{"name":"Google Faculty Research Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3489048.3522637","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T10:30:55Z","timestamp":1654165855000},"page":"7-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Traffic Refinery"],"prefix":"10.1145","author":[{"given":"Francesco","family":"Bronzino","sequence":"first","affiliation":[{"name":"Universit\u00e9 Savoie Mont Blanc, Annecy-le-Vieux, France"}]},{"given":"Paul","family":"Schmitt","sequence":"additional","affiliation":[{"name":"USC Information Sciences Institute, Los Angeles, CA, USA"}]},{"given":"Sara","family":"Ayoubi","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Paris-Saclay, France"}]},{"given":"Hyojoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Renata","family":"Teixeira","sequence":"additional","affiliation":[{"name":"Inria Paris, Paris, France"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Traffic Refinery. https:\/\/github.com\/traffic-refinery\/traffic-refinery.  2021. Traffic Refinery. https:\/\/github.com\/traffic-refinery\/traffic-refinery."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"e_1_3_2_1_4_1","unstructured":"David Sculley et al. 2015. Hidden technical debt in machine learning systems. In Advances in neural information processing systems. 2503--2511.  David Sculley et al. 2015. Hidden technical debt in machine learning systems. In Advances in neural information processing systems. 2503--2511."},{"key":"e_1_3_2_1_5_1","first-page":"4349","article-title":"A survey on machine learning techniques for intrusion detection systems","volume":"2","author":"Singh Jayveer","year":"2013","unstructured":"Jayveer Singh and Manisha J Nene . 2013 . A survey on machine learning techniques for intrusion detection systems . International Journal of Advanced Research in Computer and Communication Engineering , Vol. 2 , 11 (2013), 4349 -- 4355 . Jayveer Singh and Manisha J Nene. 2013. A survey on machine learning techniques for intrusion detection systems. International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, 11 (2013), 4349--4355.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"}],"event":{"name":"SIGMETRICS\/PERFORMANCE '22: ACM SIGMETRICS\/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems","location":"Mumbai India","acronym":"SIGMETRICS\/PERFORMANCE '22","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstract Proceedings of the 2022 ACM SIGMETRICS\/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489048.3522637","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3489048.3522637","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3489048.3522637","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3489048.3522637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:49:00Z","timestamp":1750178940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3489048.3522637"}},"subtitle":["Cost-Aware Data Representation for Machine Learning on Network Traffic"],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":5,"alternative-id":["10.1145\/3489048.3522637","10.1145\/3489048"],"URL":"https:\/\/doi.org\/10.1145\/3489048.3522637","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3547353.3522637","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}