{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:03:45Z","timestamp":1730343825047,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.23919\/ifipnetworking52078.2021.9472778","type":"proceedings-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:09:00Z","timestamp":1625861340000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["ARMHH: Accurate, Rapid and Memory-Efficient Heavy Hitter Detection with Sliding Window in the Software-Defined Network Context"],"prefix":"10.23919","author":[{"given":"Zijun","family":"Hang","sequence":"first","affiliation":[]},{"given":"Yongjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuguang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.09.014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155252"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref13","first-page":"398","article-title":"Efficient computation of frequent and top-k elements in data streams","author":"metwally","year":"0","journal-title":"International Conference on Database Theory"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00047"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057215"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref17","first-page":"323","article-title":"New directions in traffic measurement and accounting","author":"estan","year":"0","journal-title":"Proceedings of the 2002 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Smoking Out the Heavy-Hitter Flows with HashPipe","year":"2016","author":"sivaraman","key":"ref18"},{"journal-title":"Software-Defined Networking (SDN) Definition","year":"2019","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.2019.00507"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"12","DOI":"10.3182\/20130902-3-CN-3020.00044","article-title":"An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window","volume":"46","author":"ding","year":"0","journal-title":"IFAC Proceedings Volumes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"journal-title":"sFlow","year":"2020","key":"ref6"},{"journal-title":"Barefoot Tofino World's fastest P4-programmable Ethernet switch ASICs","year":"2019","key":"ref29"},{"journal-title":"CISCO IOS Netflow","year":"2020","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808888"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633035"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155487"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535780"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.860096"},{"journal-title":"Caida Anonymized internet trace 2018","year":"2019","key":"ref24"},{"journal-title":"Behavioral Model version 2","year":"2019","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2008.81"},{"key":"ref25","first-page":"1","article-title":"Udp flow detection and analysis using dynamical timeout strategy based on sliding-window","author":"sun","year":"0","journal-title":"IEEE Conference Anthology"}],"event":{"name":"2021 IFIP Networking Conference (IFIP Networking)","start":{"date-parts":[[2021,6,21]]},"location":"Espoo and Helsinki, Finland","end":{"date-parts":[[2021,6,24]]}},"container-title":["2021 IFIP Networking Conference (IFIP Networking)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9472750\/9472195\/09472778.pdf?arnumber=9472778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:09:00Z","timestamp":1643188140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9472778\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/ifipnetworking52078.2021.9472778","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]}}}