{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:57:47Z","timestamp":1770911867756,"version":"3.50.1"},"reference-count":23,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072217 and 61672269"],"award-info":[{"award-number":["62072217 and 61672269"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>\n            Being able to monitor each packet path is critical for effective measurement and management of networks. However, such detailed monitoring can be very expensive especially for large-scale networks. To address such problem, inspired by thermodynamics, which uses the statistical characteristics of a large number of molecules\u2019 motion but not each molecule\u2019s trajectory for analysis, we propose the new concept of\n            <jats:italic>network temperature<\/jats:italic>\n            together with the notions of\n            <jats:italic>network-specific heat<\/jats:italic>\n            and\n            <jats:italic>network temperature gradient<\/jats:italic>\n            . Our approach does not only provide a statistical view of the current network state consisting of all the active packet paths at each time instant, but can be used to represent transitions among network states. Our network temperature-based methods have a broad applicability, such as to DDoS detection, dynamic node importance ranking, network stability and robustness evaluation, reliable packets routing, provenance compression assessment, and so on. Numerical and\/or the experimental results show that our methods are effective.\n          <\/jats:p>","DOI":"10.1145\/3511093","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T17:37:06Z","timestamp":1643737026000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Network Temperature: A Novel Statistical Index for Networks Measurement and Management"],"prefix":"10.1145","volume":"22","author":[{"given":"Changda","family":"Wang","sequence":"first","affiliation":[{"name":"Jiangsu University, Zhenjiang, Jiangsu, China"}]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"Jiangsu University, Zhenjiang, Jiangsu, China"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette,, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","volume-title":"Principles, Systems and Applications of IP Telecommunications (IPTComm)","author":"Aljaedi Amer","year":"2016","unstructured":"Amer Aljaedi and C. Edward Chow. 2016. Pathseer: A centralized tracer of packet trajectories in software-defined datacenter networks. In Principles, Systems and Applications of IP Telecommunications (IPTComm). IEEE, 1\u20139. DOI:https:\/\/doi.org\/10.1109\/IPTComm39427.2016.7780246"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.02.015"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/e17042367"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature10872"},{"key":"e_1_3_1_6_2","volume-title":"Science and Infromation Theory","author":"Brillouin Leon","year":"1956","unstructured":"Leon Brillouin. 1956. Science and Infromation Theory. Academic Press, New York, NY."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2017.01.037"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2871213"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2014.7017068"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1147\/rd.53.0183"},{"key":"e_1_3_1_11_2","unstructured":"\u00c2ngelo Cardoso Lapolli Jonatas Adilson Marques and Luciano Paschoal Gaspary. 2019. Offloading real-time DDoS attack detection to programmable data planes. In IFIP\/IEEE Symposium on Integrated Network and Service Management (IM\u201919) . 19\u201327."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-2012-0_7"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925635"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/1231003.1231007"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2997653"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2402156"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-016-0017-x"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968834"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2009.1180.1188"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1755-5"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.06.003"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251116"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978142"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:58Z","timestamp":1750191118000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3511093"],"URL":"https:\/\/doi.org\/10.1145\/3511093","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2]]},"assertion":[{"value":"2021-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}