{"id":"https://openalex.org/W2169700960","doi":"https://doi.org/10.1145/1341431.1341437","title":"WebClass","display_name":"WebClass","publication_year":2008,"publication_date":"2008-01-30","ids":{"openalex":"https://openalex.org/W2169700960","doi":"https://doi.org/10.1145/1341431.1341437","mag":"2169700960"},"language":"en","primary_location":{"id":"doi:10.1145/1341431.1341437","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1341431.1341437","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017863056","display_name":"Haakon Ringberg","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Haakon Ringberg","raw_affiliation_strings":["Princeton University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058104701","display_name":"Augustin Soule","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Augustin Soule","raw_affiliation_strings":["Thomson"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Thomson","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003914268","display_name":"Jennifer Rexford","orcid":"https://orcid.org/0000-0002-0231-8165"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jennifer Rexford","raw_affiliation_strings":["Princeton University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Princeton University","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017863056"],"corresponding_institution_ids":["https://openalex.org/I20089843"],"apc_list":null,"apc_paid":null,"fwci":4.1936,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.94651064,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"38","issue":"1","first_page":"35","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8718149662017822},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6362061500549316},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5870331525802612},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.48412856459617615},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4828908443450928},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.4728417992591858},{"id":"https://openalex.org/keywords/graphical-user-interface","display_name":"Graphical user interface","score":0.4497676491737366},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3819800317287445},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.38153278827667236},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3747009038925171},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09954899549484253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8718149662017822},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6362061500549316},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5870331525802612},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.48412856459617615},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4828908443450928},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.4728417992591858},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.4497676491737366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3819800317287445},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.38153278827667236},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3747009038925171},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09954899549484253},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1341431.1341437","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1341431.1341437","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W59037818","https://openalex.org/W77717277","https://openalex.org/W1632114991","https://openalex.org/W1952056635","https://openalex.org/W1968439359","https://openalex.org/W2001381273","https://openalex.org/W2098366185","https://openalex.org/W2102481563","https://openalex.org/W2112135709","https://openalex.org/W2118931532","https://openalex.org/W2121511513","https://openalex.org/W2127589913","https://openalex.org/W2141282920","https://openalex.org/W2141689873","https://openalex.org/W2157578436","https://openalex.org/W2164210932","https://openalex.org/W2166858086","https://openalex.org/W2169927847","https://openalex.org/W2293322640","https://openalex.org/W2999031389","https://openalex.org/W3009746682"],"related_works":["https://openalex.org/W2505786821","https://openalex.org/W2105642232","https://openalex.org/W3197833032","https://openalex.org/W3207332793","https://openalex.org/W4386081464","https://openalex.org/W2499612753","https://openalex.org/W3113278055","https://openalex.org/W3195346651","https://openalex.org/W2750709484","https://openalex.org/W2022968056"],"abstract_inverted_index":{"Despite":[0],"the":[1,55,116,141,145,159,167,174],"flurry":[2],"of":[3,64,163],"anomaly-detection":[4],"papers":[5],"in":[6,51,144,153],"recent":[7],"years,":[8],"effective":[9],"ways":[10],"to":[11,40,102,115,123,140,172,178],"validate":[12],"and":[13,33,75,98,126,157],"compare":[14],"proposed":[15],"solutions":[16],"have":[17],"remained":[18],"elusive.":[19],"We":[20,136],"argue":[21],"that":[22,54,93,112,147,158,176],"evaluating":[23],"anomaly":[24],"detectors":[25,42,56],"on":[26,43],"manually":[27],"labeled":[28,155],"traces":[29,44,66,156,160],"is":[30,38,50,67,89,96],"both":[31],"important":[32,39],"unavoidable.":[34],"In":[35,60,100],"particular,":[36],"it":[37,49,148],"evaluate":[41],"from":[45,77],"operational":[46],"networks":[47],"because":[48,69,166],"this":[52],"setting":[53],"must":[57],"ultimately":[58],"succeed.":[59],"addition,":[61],"manual":[62,78,94,117],"labeling":[63,95,118],"such":[65],"unavoidable":[68],"new":[70],"anomalies":[71],"will":[72,149,161],"be":[73,162],"identified":[74],"characterized":[76],"inspection":[79],"long":[80],"before":[81],"there":[82],"are":[83,137],"realistic":[84],"models":[85],"for":[86],"them.":[87],"It":[88],"well":[90],"known,":[91],"however,":[92],"slow":[97],"error-prone.":[99],"order":[101],"mitigate":[103],"these":[104],"challenges,":[105],"we":[106],"present":[107],"WebClass,":[108],"a":[109,131,179],"web-based":[110],"infrastructure":[111],"adds":[113],"rigor":[114],"process.":[119],"WebClass":[120,139],"allows":[121],"researchers":[122],"share,":[124],"inspect,":[125],"label":[127,181],"traffic":[128],"time-series":[129],"through":[130],"common":[132],"graphical":[133],"user":[134],"interface.":[135],"releasing":[138],"research":[142],"community":[143,169],"hope":[146],"foster":[150],"greater":[151],"collaboration":[152],"creating":[154],"higher":[164],"quality":[165],"entire":[168],"has":[170],"access":[171],"all":[173],"information":[175],"led":[177],"given":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":4}],"updated_date":"2026-05-03T08:25:01.440150","created_date":"2016-06-24T00:00:00"}
