{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:57:10Z","timestamp":1760029030276,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T00:00:00Z","timestamp":1659916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006168","name":"National Nuclear Security Administration","doi-asserted-by":"publisher","award":["DE-NA0003525"],"award-info":[{"award-number":["DE-NA0003525"]}],"id":[{"id":"10.13039\/100006168","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006234","name":"Sandia National Laboratories","doi-asserted-by":"publisher","award":["PO2160586"],"award-info":[{"award-number":["PO2160586"]}],"id":[{"id":"10.13039\/100006234","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,8]]},"DOI":"10.1145\/3546096.3546103","type":"proceedings-article","created":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T16:05:58Z","timestamp":1659629158000},"page":"59-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["The DARPA SEARCHLIGHT Dataset of Application Network Traffic"],"prefix":"10.1145","author":[{"given":"Calvin","family":"Ardi","sequence":"first","affiliation":[{"name":"USC\/Information Sciences Institute, United States of America"}]},{"given":"Connor","family":"Aubry","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, USA"}]},{"given":"Brian","family":"Kocoloski","sequence":"additional","affiliation":[{"name":"USC\/Information Sciences Institute, United States of America"}]},{"given":"Dave","family":"DeAngelis","sequence":"additional","affiliation":[{"name":"USC\/Information Sciences Institute, United States of America"}]},{"given":"Alefiya","family":"Hussain","sequence":"additional","affiliation":[{"name":"USC\/Information Sciences Institute, United States of America"}]},{"given":"Matt","family":"Troglia","sequence":"additional","affiliation":[{"name":"Sandia National Laboratories, United States of America"}]},{"given":"Stephen","family":"Schwab","sequence":"additional","affiliation":[{"name":"USC\/Information Sciences Institute, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,8,8]]},"reference":[{"volume-title":"Jitsi Meet. https:\/\/jitsi.org\/meet","year":"2022","key":"e_1_3_2_1_1_1","unstructured":"8x8. 2022 . Jitsi Meet. https:\/\/jitsi.org\/meet 8x8. 2022. Jitsi Meet. https:\/\/jitsi.org\/meet"},{"key":"e_1_3_2_1_2_1","volume-title":"Building Reproducible Video Streaming Traffic Generators. In Cyber Security Experimentation and Test Workshop","author":"Ardi Calvin","year":"2021","unstructured":"Calvin Ardi , Alefiya Hussain , and Stephen Schwab . 2021 . Building Reproducible Video Streaming Traffic Generators. In Cyber Security Experimentation and Test Workshop ( Virtual, CA, USA) (CSET \u201921). Association for Computing Machinery, New York, NY, USA, 91\u201395. https:\/\/doi.org\/10.1145\/3474718.3474721 10.1145\/3474718.3474721 Calvin Ardi, Alefiya Hussain, and Stephen Schwab. 2021. Building Reproducible Video Streaming Traffic Generators. In Cyber Security Experimentation and Test Workshop (Virtual, CA, USA) (CSET \u201921). Association for Computing Machinery, New York, NY, USA, 91\u201395. https:\/\/doi.org\/10.1145\/3474718.3474721"},{"key":"e_1_3_2_1_3_1","unstructured":"MergeTB Authors. 2022. The Merge Testbed Platform. https:\/\/next.mergetb.org  MergeTB Authors. 2022. The Merge Testbed Platform. https:\/\/next.mergetb.org"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_1_5_1","unstructured":"RIPE Network\u00a0Coordination Center. 2022. RIPE Atlas. https:\/\/www.ripe.net\/analyse\/internet-measurements  RIPE Network\u00a0Coordination Center. 2022. RIPE Atlas. https:\/\/www.ripe.net\/analyse\/internet-measurements"},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021)","author":"Clark David","year":"2021","unstructured":"kc claffy, David Clark , John Heidemann , Fabian Bustamante , Mattijs Jonker , Aaron Schulman , and Ellen Zegura . 2021 . Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) Final Report. SIGCOMM Comput. Commun. Rev. 51, 3 (July 2021), 33\u201340. https:\/\/doi.org\/10.1145\/3477482.3477489 10.1145\/3477482.3477489 kc claffy, David Clark, John Heidemann, Fabian Bustamante, Mattijs Jonker, Aaron Schulman, and Ellen Zegura. 2021. Workshop on Overcoming Measurement Barriers to Internet Research (WOMBIR 2021) Final Report. SIGCOMM Comput. Commun. Rev. 51, 3 (July 2021), 33\u201340. https:\/\/doi.org\/10.1145\/3477482.3477489"},{"key":"e_1_3_2_1_7_1","unstructured":"DARPA. 2022. Searchlight. https:\/\/www.darpa.mil\/program\/searchlight  DARPA. 2022. Searchlight. https:\/\/www.darpa.mil\/program\/searchlight"},{"volume-title":"Generating Representative Video Teleconferencing Traffic(CSET \u201922)","author":"DeAngelis David","key":"e_1_3_2_1_8_1","unstructured":"David DeAngelis , Alefiya Hussain , Brian Kocoloski , Calvin Ardi , and Stephen Schwab . 2022. Generating Representative Video Teleconferencing Traffic(CSET \u201922) . Association for Computing Machinery , New York, NY, USA . https:\/\/doi.org\/10.1145\/3546096.3546107 10.1145\/3546096.3546107 David DeAngelis, Alefiya Hussain, Brian Kocoloski, Calvin Ardi, and Stephen Schwab. 2022. Generating Representative Video Teleconferencing Traffic(CSET \u201922). Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3546096.3546107"},{"key":"e_1_3_2_1_9_1","volume-title":"Wireguard: Next Generation Kernel Network Tunnel. In 24th Annual Network and Distributed System Security Symposium","author":"Donenfeld A","year":"2017","unstructured":"Jason\u00a0 A Donenfeld . 2017 . Wireguard: Next Generation Kernel Network Tunnel. In 24th Annual Network and Distributed System Security Symposium ( San Diego, California, USA) (NDSS \u201917). Internet Society. https:\/\/doi.org\/10.14722\/ndss. 2017.23160 10.14722\/ndss.2017.23160 Jason\u00a0A Donenfeld. 2017. Wireguard: Next Generation Kernel Network Tunnel. In 24th Annual Network and Distributed System Security Symposium (San Diego, California, USA) (NDSS \u201917). Internet Society. https:\/\/doi.org\/10.14722\/ndss.2017.23160"},{"volume-title":"IPSec: the new security standard for the Internet, intranets, and virtual private networks","author":"Doraswamy Naganand","key":"e_1_3_2_1_10_1","unstructured":"Naganand Doraswamy and Dan Harkins . 2003. IPSec: the new security standard for the Internet, intranets, and virtual private networks . Prentice Hall Professional . Naganand Doraswamy and Dan Harkins. 2003. IPSec: the new security standard for the Internet, intranets, and virtual private networks. Prentice Hall Professional."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1823844.1823853"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423658"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465212"},{"key":"e_1_3_2_1_14_1","unstructured":"The\u00a0Etherpad Foundation. 2022. Etherpad. https:\/\/etherpad.org  The\u00a0Etherpad Foundation. 2022. Etherpad. https:\/\/etherpad.org"},{"key":"e_1_3_2_1_15_1","unstructured":"Timur Friedman Phillipa Gill Sue Moon Dave Clark and \u00cdtalo Cunha. 2022. The Networking Channel: Network Datasets: what exists and what are the problems?https:\/\/networkingchannel.eu\/network-datasets-what-exists-and-what-are-the-problems\/  Timur Friedman Phillipa Gill Sue Moon Dave Clark and \u00cdtalo Cunha. 2022. The Networking Channel: Network Datasets: what exists and what are the problems?https:\/\/networkingchannel.eu\/network-datasets-what-exists-and-what-are-the-problems\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CATCH.2009.29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080181"},{"key":"e_1_3_2_1_18_1","unstructured":"kc claffy. 2022. CAIDA Datasets. https:\/\/www.caida.org\/catalog\/datasets\/completed-datasets\/  kc claffy. 2022. CAIDA Datasets. https:\/\/www.caida.org\/catalog\/datasets\/completed-datasets\/"},{"volume-title":"Dynamic Networks in Cybersecurity","author":"Kent D.","key":"e_1_3_2_1_19_1","unstructured":"Alexander\u00a0 D. Kent . 2016. Cyber-Security Data Sources for Dynamic Network Research . In Dynamic Networks in Cybersecurity , Niall Adams and Nick Heard (Eds.). Imperial College Press , 37\u201365. https:\/\/doi.org\/10.1142\/9781786340757_0002 10.1142\/9781786340757_0002 Alexander\u00a0D. Kent. 2016. Cyber-Security Data Sources for Dynamic Network Research. In Dynamic Networks in Cybersecurity, Niall Adams and Nick Heard (Eds.). Imperial College Press, 37\u201365. https:\/\/doi.org\/10.1142\/9781786340757_0002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474718.3474730"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00139-0"},{"key":"e_1_3_2_1_22_1","unstructured":"Microsoft. 2022. Playwright. https:\/\/playwright.dev  Microsoft. 2022. Playwright. https:\/\/playwright.dev"},{"key":"e_1_3_2_1_23_1","unstructured":"Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019). https:\/\/cdn.openai.com\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf  Alec Radford Jeff Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. 2019. Language Models are Unsupervised Multitask Learners. (2019). https:\/\/cdn.openai.com\/better-language-models\/language_models_are_unsupervised_multitask_learners.pdf"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.005"},{"volume-title":"2022 Global Internet Phenomena Report. (20","year":"2022","key":"e_1_3_2_1_26_1","unstructured":"Sandvine. 2022. 2022 Global Internet Phenomena Report. (20 Jan. 2022 ). https:\/\/www.sandvine.com\/phenomena Sandvine. 2022. 2022 Global Internet Phenomena Report. (20 Jan. 2022). https:\/\/www.sandvine.com\/phenomena"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129588"}],"event":{"name":"CSET 2022: Cyber Security Experimentation and Test Workshop","acronym":"CSET 2022","location":"Virtual CA USA"},"container-title":["Proceedings of the 15th Workshop on Cyber Security Experimentation and Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546096.3546103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:27Z","timestamp":1750183827000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546096.3546103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,8]]},"references-count":26,"alternative-id":["10.1145\/3546096.3546103","10.1145\/3546096"],"URL":"https:\/\/doi.org\/10.1145\/3546096.3546103","relation":{},"subject":[],"published":{"date-parts":[[2022,8,8]]},"assertion":[{"value":"2022-08-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}