{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:11Z","timestamp":1776926351630,"version":"3.51.2"},"reference-count":21,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066717","type":"journal-article","created":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T03:29:11Z","timestamp":1753932551000},"page":"6015-6034","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["SP-Sketch: Persistent Flow Detection with Sliding Windows on Programmable Switches"],"prefix":"10.32604","volume":"84","author":[{"given":"Yuqian","family":"Huang","sequence":"first","affiliation":[]},{"given":"Luyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zilun","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Cui","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"124356","DOI":"10.1016\/j.eswa.2024.124356","article-title":"ERT-EDR: online defense framework for TCP-targeted LDoS attacks in SDN","volume":"254","author":"Liu","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"127072","DOI":"10.1016\/j.eswa.2025.127072","article-title":"An expert-aware Markovian system for end-user proactive troubleshooting in the Network and Security Operations Center","volume":"276","author":"Le\u00f3n","year":"2025","journal-title":"Expert Syst Appl"},{"key":"ref3","first-page":"2675","article-title":"A comprehensive survey on advanced persistent threat (APT) detection Techniques","volume":"80","author":"Singamaneni Krishnapriya","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"126854","DOI":"10.1016\/j.eswa.2025.126854","article-title":"Improved network anomaly detection system using optimized autoencoder-LSTM","volume":"273","author":"Narmadha","year":"2025","journal-title":"Expert Syst Appl"},{"key":"ref5","first-page":"4411","article-title":"A sketch framework for approximate data stream processing in sliding windows","volume":"35","author":"Gou","year":"2023","journal-title":"IEEE Transact Know Data Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/TPDS.2025.3532467","article-title":"Monte: SFCs migration scheme in the distributed programmable data plane","volume":"36","author":"Zhang","year":"2025","journal-title":"IEEE Transact Parallel Distrib Syst"},{"key":"ref7","series-title":"IEEE Conference on Computer Communications (INFOCOM); 2024 May 20\u201323","first-page":"1","article-title":"Carlo: cross-plane collaboration for multiple in-network computing applications","author":"Zhang"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1109\/TNET.2018.2865125","article-title":"Identifying and estimating persistent items in data streams","volume":"26","author":"Dai","year":"2018","journal-title":"IEEE\/ACM Transact Netw"},{"key":"ref9","first-page":"1","article-title":"Finding persistent items in distributed datasets","volume":"28","author":"Dai","year":"2019","journal-title":"IEEE\/ACM Transact Netw"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"128","DOI":"10.14778\/3425879.3425884","article-title":"On-off sketch: a fast and accurate sketch on persistence","volume":"14","author":"Zhang","year":"2020","journal-title":"Proc VLDB Endow"},{"key":"ref11","series-title":"Proceedings of ACM International Conference on Knowledge Discovery & Data Mining (SIGKDD); 2020 Jul 6\u201310","first-page":"1015","article-title":"Sliding sketches: a framework using time zones for data stream processing in sliding windows","author":"Gou"},{"key":"ref12","series-title":"Algorithms-ESA 2003: 11th Annual European Symposium. Springer; 2003 Sep 16\u201319","first-page":"605","article-title":"Loglog counting of large cardinalities","author":"Durand"},{"key":"ref13","series-title":"2007 Discrete Mathematics and Theoretical Computer Science (DMTCS); 2007 Jun 17\u201322","first-page":"127","article-title":"Hyperloglog: the analysis of a near-optimal cardinality estimation algorithm","author":"Flajolet"},{"key":"ref14","series-title":"2014 IEEE 22nd International Conference on Network Protocols; 2014 Oct 21\u201324","first-page":"131","article-title":"Estimating the persistent spreads in high-speed networks","author":"Xiao"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/TNET.2020.2982003","article-title":"An efficient k-persistent spread estimator for traffic measurement in high-speed networks","volume":"28","author":"Huang","year":"2020","journal-title":"IEEE\/ACM Transact Netw"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3154498","article-title":"Persistent spread measurement for big network data based on register intersection","volume":"1","author":"Zhou","year":"2017","journal-title":"Proc ACM on Measur Analy Comput Syst"},{"key":"ref17","series-title":"EuroSys\u201925: Proceedings of the Twentieth European Conference on Computer Systems; 2025 Mar 30\u2013Apr 3","first-page":"460","article-title":"Marlin: enabling high-throughput congestion control testing in large-scale networks","author":"Chen"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"3275","DOI":"10.1109\/TDSC.2025.3528993","article-title":"Poisoning attacks and defenses to learned bloom filters for malicious URL detection","volume":"22","author":"Dong","year":"2025","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref19","unstructured":"CAIDA. Statistical information for the CAIDA Anonymized Internet Traces; 2023 [Internet]. [cited 2025 Apr 13]. Available from: https:\/\/www.caida.org\/data\/passive\/passive_trace_statistics."},{"key":"ref20","series-title":"Proceedings of International Conference on Information Systems Security and Privacy (ICISSP 2018); 2018 Jan 22\u201324","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","author":"Sharafaldin"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","article-title":"An improved data stream summary: the count-min sketch and its applications","volume":"55","author":"Cormode","year":"2005","journal-title":"J Algor"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66717\/TSP_CMC_66717.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:37Z","timestamp":1776923137000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":21,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066717","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}