{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:41:57Z","timestamp":1755999717858,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT","award":["PTDC\/CCI-INF\/30340\/2017"],"award-info":[{"award-number":["PTDC\/CCI-INF\/30340\/2017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1145\/3493425.3502767","type":"proceedings-article","created":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T11:11:51Z","timestamp":1642504311000},"page":"113-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Generic change detection (almost entirely) in the dataplane"],"prefix":"10.1145","author":[{"given":"Gon\u00e7alo","family":"Matos","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior, T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Salvatore","family":"Signorello","sequence":"additional","affiliation":[{"name":"LASIGE, Faculdade de Ci\u00eancias, Universidade de Lisboa"}]},{"given":"Fernando M. V.","family":"Ramos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior, T\u00e9cnico, Universidade de Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2022,1,18]]},"reference":[{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. The behavioral model version 2 (bmv2), the reference P4 software switch . Retrieved June 06, 2021 from https:\/\/github.com\/p4lang\/behavioral- model [n.d.]. The behavioral model version 2 (bmv2), the reference P4 software switch. Retrieved June 06, 2021 from https:\/\/github.com\/p4lang\/behavioral- model"},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Intel Programmable Ethernet Switch Products . Retrieved April 22, 2021 from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network- io\/programmable-ethernet-switch.html [n.d.]. Intel Programmable Ethernet Switch Products. Retrieved April 22, 2021 from https:\/\/www.intel.com\/content\/www\/us\/en\/products\/network- io\/programmable-ethernet-switch.html"},{"volume-title":"P4-16 Language Specification. Retrieved","year":"2021","key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. P4-16 Language Specification. Retrieved June 06, 2021 from https:\/\/opennetworking.org\/wp-content\/uploads\/2020\/10\/P416-Language-Specification.html [n.d.]. P4-16 Language Specification. Retrieved June 06, 2021 from https:\/\/opennetworking.org\/wp-content\/uploads\/2020\/10\/P416-Language-Specification.html"},{"volume-title":"The P4 Language Consortium. Retrieved","year":"2021","key":"e_1_3_2_2_4_1","unstructured":"[n.d.]. The P4 Language Consortium. Retrieved April 22, 2021 from https:\/\/p4.org\/ [n.d.]. The P4 Language Consortium. Retrieved April 22, 2021 from https:\/\/p4.org\/"},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_2_5_1","unstructured":"[n.d.]. p4c , the reference compiler for the P4 programming language . Retrieved June 06, 2021 from https:\/\/github.com\/p4lang\/p4c [n.d.]. p4c, the reference compiler for the P4 programming language. Retrieved June 06, 2021 from https:\/\/github.com\/p4lang\/p4c"},{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_2_6_1","unstructured":"[n.d.]. Scapy, the packet library for packet manipulation . Retrieved June 06, 2021 from https:\/\/scapy.net\/ [n.d.]. Scapy, the packet library for packet manipulation. Retrieved June 06, 2021 from https:\/\/scapy.net\/"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982739"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Monowar H. Bhuyan D. K. Bhattacharyya and J. K. Kalita. 2014. Network Anomaly Detection: Methods Systems and Tools. IEEE Communications Surveys Tutorials 16 1 (2014).  Monowar H. Bhuyan D. K. Bhattacharyya and J. K. Kalita. 2014. Network Anomaly Detection: Methods Systems and Tools. IEEE Communications Surveys Tutorials 16 1 (2014).","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850761"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.860096"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"e_1_3_2_2_16_1","volume-title":"Retrieved","author":"Kim Changhoon","year":"2021","unstructured":"Changhoon Kim . [n.d.]. Programming the Network Data Plane: What, How, and Why ? Retrieved April 22, 2021 from https:\/\/conferences.sigcomm.org\/events\/apnet2017\/slides\/chang.pdf Changhoon Kim. [n.d.]. Programming the Network Data Plane: What, How, and Why? Retrieved April 22, 2021 from https:\/\/conferences.sigcomm.org\/events\/apnet2017\/slides\/chang.pdf"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380830"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815707"},{"key":"e_1_3_2_2_22_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky , Tomer Doitshman , Yuval Elovici , and Asaf Shabtai . [n.d.]. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 . Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. [n.d.]. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018."},{"volume-title":"Manuscript based on invited talk from 14th SODA.","author":"Muthukrishnan S.","key":"e_1_3_2_2_23_1","unstructured":"S. Muthukrishnan . 2003. Data streams: Algorithms and applications . In Manuscript based on invited talk from 14th SODA. S. Muthukrishnan. 2003. Data streams: Algorithms and applications. In Manuscript based on invited talk from 14th SODA."},{"key":"e_1_3_2_2_24_1","volume-title":"Bro: A System for Detecting Network Intruders in Real-Time. Comput. Netw. (Dec.","author":"Paxson Vern","year":"1999","unstructured":"Vern Paxson . 1999 . Bro: A System for Detecting Network Intruders in Real-Time. Comput. Netw. (Dec. 1999). Vern Paxson. 1999. Bro: A System for Detecting Network Intruders in Real-Time. Comput. Netw. (Dec. 1999)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028814"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896150"},{"key":"e_1_3_2_2_29_1","volume-title":"Arash Habibi Lashkari, and Ali A Ghorbani","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin , Arash Habibi Lashkari, and Ali A Ghorbani . 2018 . Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSp . 108--116. Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSp. 108--116."},{"volume-title":"14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). 67--82.","author":"Sharma Naveen Kr","key":"e_1_3_2_2_30_1","unstructured":"Naveen Kr Sharma , Antoine Kaufmann , Thomas Anderson , Arvind Krishnamurthy , Jacob Nelson , and Simon Peter . 2017. Evaluating the power of flexible packet processing for network resource allocation . In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). 67--82. Naveen Kr Sharma, Antoine Kaufmann, Thomas Anderson, Arvind Krishnamurthy, Jacob Nelson, and Simon Peter. 2017. Evaluating the power of flexible packet processing for network resource allocation. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). 67--82."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"e_1_3_2_2_33_1","volume-title":"Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware. In 2020 IFIP Networking Conference (Networking). IEEE, 422--430","author":"Turkovic Belma","year":"2020","unstructured":"Belma Turkovic , Jorik Oostenbrink , Fernando Kuipers , Isaac Keslassy , and Ariel Orda . 2020 . Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware. In 2020 IFIP Networking Conference (Networking). IEEE, 422--430 . Belma Turkovic, Jorik Oostenbrink, Fernando Kuipers, Isaac Keslassy, and Ariel Orda. 2020. Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware. In 2020 IFIP Networking Conference (Networking). IEEE, 422--430."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259415"},{"volume-title":"Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11)","author":"Wendell Patrick","key":"e_1_3_2_2_35_1","unstructured":"Patrick Wendell and Michael J. Freedman . 2011. Going Viral: Flash Crowds in an Open CDN . In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11) . Patrick Wendell and Michael J. Freedman. 2011. Going Viral: Flash Crowds in an Open CDN. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365849"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"volume-title":"10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). 29--42.","author":"Yu Minlan","key":"e_1_3_2_2_38_1","unstructured":"Minlan Yu , Lavanya Jose , and Rui Miao . 2013. Software Defined Traffic Measurement with OpenSketch . In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). 29--42. Minlan Yu, Lavanya Jose, and Rui Miao. 2013. Software Defined Traffic Measurement with OpenSketch. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13). 29--42."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"}],"event":{"name":"ANCS '21: Symposium on Architectures for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"],"location":"Layfette IN USA","acronym":"ANCS '21"},"container-title":["Proceedings of the Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3493425.3502767","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3493425.3502767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:19Z","timestamp":1750268959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3493425.3502767"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":39,"alternative-id":["10.1145\/3493425.3502767","10.1145\/3493425"],"URL":"https:\/\/doi.org\/10.1145\/3493425.3502767","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]},"assertion":[{"value":"2022-01-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}