{"id":"https://openalex.org/W3201239442","doi":"https://doi.org/10.1145/3405837.3412356","title":"Visualizing QUIC and HTTP/3 with qlog and qvis","display_name":"Visualizing QUIC and HTTP/3 with qlog and qvis","publication_year":2020,"publication_date":"2020-08-10","ids":{"openalex":"https://openalex.org/W3201239442","doi":"https://doi.org/10.1145/3405837.3412356","mag":"3201239442"},"language":"en","primary_location":{"id":"doi:10.1145/3405837.3412356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3405837.3412356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007861814","display_name":"Robin Marx","orcid":"https://orcid.org/0009-0009-8345-393X"},"institutions":[{"id":"https://openalex.org/I878454856","display_name":"Hasselt University","ror":"https://ror.org/04nbhqj75","country_code":"BE","type":"education","lineage":["https://openalex.org/I878454856"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Robin Marx","raw_affiliation_strings":["Hasselt University, Diepenbeek, Belgium"],"affiliations":[{"raw_affiliation_string":"Hasselt University, Diepenbeek, Belgium","institution_ids":["https://openalex.org/I878454856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075342614","display_name":"Wim Lamotte","orcid":"https://orcid.org/0000-0003-1888-6383"},"institutions":[{"id":"https://openalex.org/I878454856","display_name":"Hasselt University","ror":"https://ror.org/04nbhqj75","country_code":"BE","type":"education","lineage":["https://openalex.org/I878454856"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Wim Lamotte","raw_affiliation_strings":["Hasselt University, Diepenbeek, Belgium"],"affiliations":[{"raw_affiliation_string":"Hasselt University, Diepenbeek, Belgium","institution_ids":["https://openalex.org/I878454856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038002768","display_name":"Peter Quax","orcid":"https://orcid.org/0000-0003-4811-0578"},"institutions":[{"id":"https://openalex.org/I878454856","display_name":"Hasselt University","ror":"https://ror.org/04nbhqj75","country_code":"BE","type":"education","lineage":["https://openalex.org/I878454856"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Peter Quax","raw_affiliation_strings":["Hasselt University, Diepenbeek, Belgium"],"affiliations":[{"raw_affiliation_string":"Hasselt University, Diepenbeek, Belgium","institution_ids":["https://openalex.org/I878454856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007861814"],"corresponding_institution_ids":["https://openalex.org/I878454856"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66154463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7998559474945068},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5945643782615662},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5490550994873047},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5186159610748291},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4713800847530365},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.45022931694984436},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.40155279636383057},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10862663388252258}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7998559474945068},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5945643782615662},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5490550994873047},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5186159610748291},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4713800847530365},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.45022931694984436},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.40155279636383057},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10862663388252258}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3405837.3412356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3405837.3412356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","raw_type":"proceedings-article"},{"id":"pmh:oai:documentserver.uhasselt.be:1942/31475","is_oa":false,"landing_page_url":"http://hdl.handle.net/1942/31475","pdf_url":null,"source":{"id":"https://openalex.org/S4306401926","display_name":"Document Server@UHasselt (UHasselt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I878454856","host_organization_name":"Hasselt University","host_organization_lineage":["https://openalex.org/I878454856"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8666649050","display_name":null,"funder_award_id":"1S02717N","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321730","display_name":"Fonds Wetenschappelijk Onderzoek","ror":"https://ror.org/03qtxy027"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2901983155","https://openalex.org/W3044032442"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W2965083567","https://openalex.org/W4235240664","https://openalex.org/W1838576100","https://openalex.org/W2757182831","https://openalex.org/W2095886385","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W97075385","https://openalex.org/W2357523926"],"abstract_inverted_index":{"The":[0],"new":[1],"QUIC":[2,49,74,119],"and":[3,29,33,80,97,132,142,155],"HTTP/3":[4],"(H3)":[5],"protocols":[6],"being":[7],"finalized":[8],"by":[9],"the":[10,85],"IETF":[11],"are":[12,100],"powerful":[13],"but":[14],"also":[15,75],"highly":[16],"complex.":[17],"They":[18],"combine":[19],"advanced":[20],"approaches":[21],"from":[22,62],"predecessors":[23],"such":[24],"as":[25],"TCP":[26],"(e.g.,":[27,36,43,109],"congestion":[28],"flow":[30],"control,":[31],"reliability)":[32],"HTTP/2":[34],"(H2)":[35],"stream":[37],"multiplexing,":[38],"prioritization),":[39],"with":[40,92,113],"cutting-edge":[41],"features":[42],"0-RTT":[44],"data,":[45],"connection":[46],"migration).":[47],"As":[48,117],"runs":[50],"on":[51],"top":[52],"of":[53],"UDP,":[54],"these":[55],"intricate":[56],"systems":[57],"have":[58],"to":[59,71,102,129,149],"be":[60,72],"re-implemented":[61],"scratch,":[63],"often":[64],"in":[65,105,157],"userspace,":[66],"which":[67],"has":[68],"turned":[69],"out":[70],"error-prone.":[73],"fully":[76],"integrates":[77],"TLS":[78,122],"1.3":[79],"is":[81,136],"end-to-end":[82],"encrypted":[83,106],"at":[84],"transport":[86],"layer.":[87],"This":[88],"means":[89],"that,":[90],"unlike":[91],"TCP,":[93],"elements":[94],"like":[95,115],"packet":[96,107],"acknowledgement":[98],"numbers":[99],"indiscernible":[101],"passive":[103],"observers":[104],"traces":[108],".pcap":[110],"files":[111],"analyzed":[112],"tools":[114],"Wireshark).":[116],"such,":[118],"requires":[120],"(ephemeral)":[121],"keys":[123],"for":[124],"even":[125],"high-level":[126],"analysis,":[127],"leading":[128],"scalability,":[130],"privacy":[131],"security":[133,144],"issues.":[134],"It":[135],"clear":[137],"that":[138],"QUIC+H3's":[139],"overall":[140],"complexity":[141],"heavy":[143],"focus":[145],"make":[146],"them":[147],"difficult":[148],"implement,":[150],"debug,":[151],"observe,":[152],"analyse,":[153],"use":[154],"teach":[156],"practice.":[158]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
