{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:38Z","timestamp":1750219838078,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["2022.09325.PTDC","2020.05965.BD"],"award-info":[{"award-number":["2022.09325.PTDC","2020.05965.BD"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["101093126"],"award-info":[{"award-number":["101093126"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1145\/3603269.3610866","type":"proceedings-article","created":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T16:16:29Z","timestamp":1693584989000},"page":"1105-1107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: In-Network ML Feature Computation for Malicious Traffic Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5644-4397","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Romeiras Amado","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6215-3569","authenticated-orcid":false,"given":"Francisco Chami\u00e7a","family":"Pereira","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6628-0541","authenticated-orcid":false,"given":"Salvatore","family":"Signorello","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7873-5531","authenticated-orcid":false,"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3585-8587","authenticated-orcid":false,"given":"Fernando","family":"Ramos","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24067"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241157"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484585"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314352"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361427"},{"key":"e_1_3_2_1_7_1","volume-title":"10th USENIX Workshop on Free and Open Communications on the Internet","author":"Hounsel Austin","year":"2020","unstructured":"Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, and Jonathan Mayer. Identifying disinformation websites using infrastructure features. In 10th USENIX Workshop on Free and Open Communications on the Internet, 2020."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel. P416 Intel\u00ae Tofino\u2122 Native Architecture - Public Version. Retrieved 2023-02-15. URL: https:\/\/raw.githubusercontent.com\/barefootnetworks\/Open-Tofino\/master\/PUBLIC_Tofino-Native-Arch.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel. The Intel\u00ae Tofino\u2122 series of P4-programmable Ethernet switch ASICs. Retrieved 2022-10-20. URL: https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/network-io\/programmable-ethernet-switch\/tofino-series.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23269"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_12_1","volume-title":"24th USENIX Security Symposium","author":"Nelms Terry","year":"2015","unstructured":"Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad. WebWitness: Investigating, categorizing, and mitigating malware download paths. In 24th USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_1_14_1","first-page":"229","volume-title":"Proceedings of LISA'99: 13th Systems Administration Conference","volume":"99","author":"Martin","year":"1999","unstructured":"Martin Roesch et al. Snort: Lightweight intrusion detection for networks. In Proceedings of LISA'99: 13th Systems Administration Conference, volume 99, pages 229--238, 1999."},{"key":"e_1_3_2_1_15_1","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp, 1:108--116, 2018.","journal-title":"ICISSp"},{"key":"e_1_3_2_1_16_1","first-page":"1083","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation","author":"Zhao Zhipeng","year":"2020","unstructured":"Zhipeng Zhao, Hugo Sadok, Nirav Atre, James C Hoe, Vyas Sekar, and Justine Sherry. Achieving 100gbps intrusion prevention on a single server. In 14th USENIX Symposium on Operating Systems Design and Implementation, pages 1083--1100, 2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978304"}],"event":{"name":"ACM SIGCOMM '23: ACM SIGCOMM 2023 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"New York NY USA","acronym":"ACM SIGCOMM '23"},"container-title":["Proceedings of the ACM SIGCOMM 2023 Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3610866","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603269.3610866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:44Z","timestamp":1750178804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603269.3610866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":17,"alternative-id":["10.1145\/3603269.3610866","10.1145\/3603269"],"URL":"https:\/\/doi.org\/10.1145\/3603269.3610866","relation":{},"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"2023-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}