{"id":"https://openalex.org/W2142151728","doi":"https://doi.org/10.1145/2600176.2600203","title":"Secure-by-construction composable componentry for network processing","display_name":"Secure-by-construction composable componentry for network processing","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2142151728","doi":"https://doi.org/10.1145/2600176.2600203","mag":"2142151728"},"language":"en","primary_location":{"id":"doi:10.1145/2600176.2600203","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600203","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082916777","display_name":"Lisa Durbeck","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lisa J. K. Durbeck","raw_affiliation_strings":["Cell Matrix Corporation, Newport, Virginia"],"affiliations":[{"raw_affiliation_string":"Cell Matrix Corporation, Newport, Virginia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103964132","display_name":"Peter M. Athanas","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peter M. Athanas","raw_affiliation_strings":["Virginia Tech, Blacksburg, Virginia"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Blacksburg, Virginia","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110034295","display_name":"Nicholas J. Macias","orcid":null},"institutions":[{"id":"https://openalex.org/I127545255","display_name":"Clark College","ror":"https://ror.org/00k71kh37","country_code":"US","type":"education","lineage":["https://openalex.org/I127545255"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nicholas J. Macias","raw_affiliation_strings":["Clark College, Vancouver, Washington","Clark College, Vancouver, Washington#TAB#"],"affiliations":[{"raw_affiliation_string":"Clark College, Vancouver, Washington","institution_ids":["https://openalex.org/I127545255"]},{"raw_affiliation_string":"Clark College, Vancouver, Washington#TAB#","institution_ids":["https://openalex.org/I127545255"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5082916777"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11460611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8534401655197144},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5243366360664368},{"id":"https://openalex.org/keywords/decimation","display_name":"Decimation","score":0.4686927795410156},{"id":"https://openalex.org/keywords/stream-processing","display_name":"Stream processing","score":0.4499460756778717},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.443854421377182},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4359840750694275},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4220200181007385},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4074215888977051},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3599914312362671},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3237481117248535},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2951180338859558},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20710930228233337},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.15585830807685852}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8534401655197144},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5243366360664368},{"id":"https://openalex.org/C173642442","wikidata":"https://www.wikidata.org/wiki/Q1253346","display_name":"Decimation","level":3,"score":0.4686927795410156},{"id":"https://openalex.org/C107027933","wikidata":"https://www.wikidata.org/wiki/Q2006448","display_name":"Stream processing","level":2,"score":0.4499460756778717},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.443854421377182},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4359840750694275},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4220200181007385},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4074215888977051},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3599914312362671},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3237481117248535},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2951180338859558},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20710930228233337},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.15585830807685852},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600176.2600203","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600203","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W101494604","https://openalex.org/W1976695383","https://openalex.org/W2113755305","https://openalex.org/W2154991996","https://openalex.org/W2182664258","https://openalex.org/W2912929781","https://openalex.org/W6604115502","https://openalex.org/W6759063450"],"related_works":["https://openalex.org/W2082671441","https://openalex.org/W2605169415","https://openalex.org/W180351855","https://openalex.org/W2538312128","https://openalex.org/W2904574017","https://openalex.org/W3113817755","https://openalex.org/W2794178276","https://openalex.org/W2295837926","https://openalex.org/W4234804492","https://openalex.org/W2529735807"],"abstract_inverted_index":{"Techniques":[0],"commonly":[1],"used":[2,79],"for":[3,41,97],"analyzing":[4,124],"streaming":[5,125],"video,":[6],"audio,":[7],"SIGINT,":[8],"and":[9,19,27,70,89,105,110,117,123],"network":[10,75,95],"transmissions,":[11],"at":[12,82,93],"less-than-streaming":[13],"rates,":[14],"such":[15],"as":[16],"data":[17,44,83,106],"decimation":[18],"ad-hoc":[20],"sampling,":[21],"can":[22,77,136],"miss":[23],"underlying":[24],"structure,":[25],"trends":[26],"specific":[28],"events":[29],"held":[30],"in":[31],"the":[32,42,64,94],"data[3].":[33],"This":[34],"work":[35],"presents":[36],"a":[37,98,130],"secure-by-construction":[38,56],"approach":[39,57],"[7]":[40],"upper-end":[43],"streams":[45],"with":[46],"rates":[47],"from":[48],"10-":[49],"to":[50,59,121,138],"100":[51],"Gigabits":[52],"per":[53],"second.":[54],"The":[55,73],"strives":[58],"produce":[60],"system":[61],"security":[62],"through":[63],"composition":[65],"of":[66,101],"individually":[67],"secure":[68],"hardware":[69],"software":[71],"components.":[72],"proposed":[74],"processor":[76],"be":[78],"not":[80],"only":[81],"centers":[84],"but":[85],"also":[86],"within":[87],"networks":[88],"onboard":[90],"embedded":[91],"systems":[92],"periphery":[96],"wide":[99],"range":[100],"tasks,":[102],"including":[103],"preprocessing":[104],"cleansing,":[107],"signal":[108],"encoding":[109],"compression,":[111],"complex":[112],"event":[113],"processing,":[114],"flow":[115],"analysis,":[116],"other":[118],"tasks":[119],"related":[120],"collecting":[122],"data.":[126],"Our":[127],"design":[128],"employs":[129],"four-layer":[131],"scalable":[132],"hardware/software":[133],"stack":[134],"that":[135],"lead":[137],"inherently":[139],"secure,":[140],"easily":[141],"constructed":[142],"specialized":[143],"high-speed":[144],"stream":[145],"processing.":[146]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
