{"id":"https://openalex.org/W2985027001","doi":"https://doi.org/10.1145/3318216.3363375","title":"Informer","display_name":"Informer","publication_year":2019,"publication_date":"2019-11-04","ids":{"openalex":"https://openalex.org/W2985027001","doi":"https://doi.org/10.1145/3318216.3363375","mag":"2985027001"},"language":"en","primary_location":{"id":"doi:10.1145/3318216.3363375","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3318216.3363375","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3318216.3363375","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3318216.3363375","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101936161","display_name":"Jiyu Chen","orcid":"https://orcid.org/0000-0002-0144-6376"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiyu Chen","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102719001","display_name":"Heqing Huang","orcid":"https://orcid.org/0000-0002-7862-445X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heqing Huang","raw_affiliation_strings":["ByteDance Inc"],"affiliations":[{"raw_affiliation_string":"ByteDance Inc","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100353550","display_name":"Hao Chen","orcid":"https://orcid.org/0000-0002-4072-0710"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hao Chen","raw_affiliation_strings":["University of California, Davis"],"affiliations":[{"raw_affiliation_string":"University of California, Davis","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101936161"],"corresponding_institution_ids":["https://openalex.org/I84218800"],"apc_list":null,"apc_paid":null,"fwci":0.1857,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.57498011,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"389","last_page":"394"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.9941530227661133},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7652145624160767},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6871418356895447},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5230989456176758},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.44653597474098206},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.16831091046333313},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13702216744422913}],"concepts":[{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.9941530227661133},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7652145624160767},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6871418356895447},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5230989456176758},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.44653597474098206},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.16831091046333313},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13702216744422913},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3318216.3363375","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3318216.3363375","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3318216.3363375","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:hub.hku.hk:10722/346748","is_oa":false,"landing_page_url":"https://hub.hku.hk/handle/10722/346748","pdf_url":null,"source":{"id":"https://openalex.org/S4377196271","display_name":"The HKU Scholars Hub (University of Hong Kong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I889458895","host_organization_name":"University of Hong Kong","host_organization_lineage":["https://openalex.org/I889458895"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference_Paper"}],"best_oa_location":{"id":"doi:10.1145/3318216.3363375","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3318216.3363375","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3318216.3363375","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM/IEEE Symposium on Edge Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G2043895709","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G3376968242","display_name":null,"funder_award_id":"1801751","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3693556586","display_name":null,"funder_award_id":"2-004","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3732666562","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G4307486606","display_name":null,"funder_award_id":"W911NF-13-2-0045 (ARL Cyber Security CRA)","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G5259331294","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G5378638770","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338320","funder_display_name":"U.S. Army Aeromedical Research Laboratory"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8727049869","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8763038417","display_name":null,"funder_award_id":"Cooperative Agreement Number W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320315784","display_name":"U.S. Army Combat Capabilities Development Command Soldier Center","ror":"https://ror.org/02rdkx920"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"},{"id":"https://openalex.org/F4320338320","display_name":"U.S. Army Aeromedical Research Laboratory","ror":"https://ror.org/01ajqvg59"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2985027001.pdf","grobid_xml":"https://content.openalex.org/works/W2985027001.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1673310716","https://openalex.org/W1924770834","https://openalex.org/W2226408297","https://openalex.org/W2327620174","https://openalex.org/W2393319904","https://openalex.org/W2415243320","https://openalex.org/W2792839479","https://openalex.org/W2903871660","https://openalex.org/W2949888546","https://openalex.org/W2963358464","https://openalex.org/W3103720336"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4210334847","https://openalex.org/W3181741639","https://openalex.org/W4367181468","https://openalex.org/W2767473057","https://openalex.org/W4225586032","https://openalex.org/W3003367851","https://openalex.org/W3119944216","https://openalex.org/W2994988622"],"abstract_inverted_index":{"Containerized":[0],"microservices":[1,19,35],"have":[2],"been":[3],"widely":[4],"deployed":[5],"in":[6],"industry.":[7],"Meanwhile,":[8],"security":[9,14,61],"issues":[10],"also":[11],"arise.":[12],"Many":[13],"enhancement":[15],"mechanisms":[16],"for":[17,59,66],"containerized":[18],"require":[20],"predefined":[21],"rules":[22],"and":[23,36],"policies.":[24],"However,":[25],"it":[26,30],"is":[27],"challenging":[28],"when":[29],"comes":[31],"to":[32],"thousands":[33],"of":[34,40],"a":[37],"massive":[38],"amount":[39],"real-time":[41],"unstructured":[42],"data.":[43],"Hence,":[44],"automatic":[45,57],"policy":[46],"generation":[47],"becomes":[48],"indispensable.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53],"focus":[54],"on":[55],"the":[56,60],"solution":[58],"problem:":[62],"irregular":[63],"traffic":[64],"detection":[65],"RPCs.":[67]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2019-11-22T00:00:00"}
