{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:MBPMOJTDLMZKEMEJXGVRKKZZNS","short_pith_number":"pith:MBPMOJTD","canonical_record":{"source":{"id":"1808.08353","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2018-08-25T04:06:12Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"2679c0cb7edffdea622ac5850db2127614b365ea106e05be967d8b4fbae573e2","abstract_canon_sha256":"2a4d6ac91b44200c2dfc43cc9b3808cfbe1d7e8999f34a63b6f2449572374b63"},"schema_version":"1.0"},"canonical_sha256":"605ec726635b32a23089b9ab152b396c8d28cd291328211af5d9726897d3f6cd","source":{"kind":"arxiv","id":"1808.08353","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1808.08353","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"arxiv_version","alias_value":"1808.08353v1","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1808.08353","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"pith_short_12","alias_value":"MBPMOJTDLMZK","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MBPMOJTDLMZKEMEJ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MBPMOJTD","created_at":"2026-05-18T12:32:37Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:MBPMOJTDLMZKEMEJXGVRKKZZNS","target":"record","payload":{"canonical_record":{"source":{"id":"1808.08353","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2018-08-25T04:06:12Z","cross_cats_sorted":["cs.CR"],"title_canon_sha256":"2679c0cb7edffdea622ac5850db2127614b365ea106e05be967d8b4fbae573e2","abstract_canon_sha256":"2a4d6ac91b44200c2dfc43cc9b3808cfbe1d7e8999f34a63b6f2449572374b63"},"schema_version":"1.0"},"canonical_sha256":"605ec726635b32a23089b9ab152b396c8d28cd291328211af5d9726897d3f6cd","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:07:16.822623Z","signature_b64":"HZ8w8XhNi/8eut93fMN04skObqDPWim8Pnz/HuYx48WlFVLzUMtjdgjxw3UB98JGcfRjmiXC5uKNQ2vOshSgBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"605ec726635b32a23089b9ab152b396c8d28cd291328211af5d9726897d3f6cd","last_reissued_at":"2026-05-18T00:07:16.822025Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:07:16.822025Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1808.08353","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:07:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"E0/PgyuSFNkAnFEQ1k4uEKMeiP5JdvSC7cf0HAIDld2o5ZfRmb1m2122BveO/s67W4lONMZCJibSdzDscq7EAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T15:56:01.584110Z"},"content_sha256":"4da2673655c08cce1070fdae7401cf6d2aeacfb956f23570a0e83df0c7a6b268","schema_version":"1.0","event_id":"sha256:4da2673655c08cce1070fdae7401cf6d2aeacfb956f23570a0e83df0c7a6b268"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:MBPMOJTDLMZKEMEJXGVRKKZZNS","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Hyperscaling Internet Graph Analysis with D4M on the MIT SuperCloud","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR"],"primary_cat":"cs.DC","authors_text":"Albert Reuther, Andrew Prout, Antonio Rosa, Bill Bergeron, Chansup Byun, Charles Yee, David Bestor, Jeremy Kepner, Julie Mullen, Lauren Milechin, Matthew Hubbell, Micheal Houle, Micheal Jones, Peter Michaleas, Siddharth Samsi, Vijay Gadepally, William Arcand","submitted_at":"2018-08-25T04:06:12Z","abstract_excerpt":"Detecting anomalous behavior in network traffic is a major challenge due to the volume and velocity of network traffic. For example, a 10 Gigabit Ethernet connection can generate over 50 MB/s of packet headers. For global network providers, this challenge can be amplified by many orders of magnitude. Development of novel computer network traffic analytics requires: high level programming environments, massive amount of packet capture (PCAP) data, and diverse data products for \"at scale\" algorithm pipeline development. D4M (Dynamic Distributed Dimensional Data Model) combines the power of spars"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1808.08353","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:07:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"nCx1IiXlJK2rzJw5LhWrnN8gaWGEWg68aaIFycc4fLefZ6KaZ8K/yGjFD2t58+jV7qlQRvvjoEA+UZAqtK1WDg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-24T15:56:01.584740Z"},"content_sha256":"18f6e05a3787ced25d54e5f9b67ffa0e0226058a371a9df892dcc04a0448f038","schema_version":"1.0","event_id":"sha256:18f6e05a3787ced25d54e5f9b67ffa0e0226058a371a9df892dcc04a0448f038"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/bundle.json","state_url":"https://pith.science/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-24T15:56:01Z","links":{"resolver":"https://pith.science/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS","bundle":"https://pith.science/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/bundle.json","state":"https://pith.science/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/state.json","well_known_bundle":"https://pith.science/.well-known/pith/MBPMOJTDLMZKEMEJXGVRKKZZNS/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:MBPMOJTDLMZKEMEJXGVRKKZZNS","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"2a4d6ac91b44200c2dfc43cc9b3808cfbe1d7e8999f34a63b6f2449572374b63","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2018-08-25T04:06:12Z","title_canon_sha256":"2679c0cb7edffdea622ac5850db2127614b365ea106e05be967d8b4fbae573e2"},"schema_version":"1.0","source":{"id":"1808.08353","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1808.08353","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"arxiv_version","alias_value":"1808.08353v1","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1808.08353","created_at":"2026-05-18T00:07:16Z"},{"alias_kind":"pith_short_12","alias_value":"MBPMOJTDLMZK","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_16","alias_value":"MBPMOJTDLMZKEMEJ","created_at":"2026-05-18T12:32:37Z"},{"alias_kind":"pith_short_8","alias_value":"MBPMOJTD","created_at":"2026-05-18T12:32:37Z"}],"graph_snapshots":[{"event_id":"sha256:18f6e05a3787ced25d54e5f9b67ffa0e0226058a371a9df892dcc04a0448f038","target":"graph","created_at":"2026-05-18T00:07:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Detecting anomalous behavior in network traffic is a major challenge due to the volume and velocity of network traffic. For example, a 10 Gigabit Ethernet connection can generate over 50 MB/s of packet headers. For global network providers, this challenge can be amplified by many orders of magnitude. Development of novel computer network traffic analytics requires: high level programming environments, massive amount of packet capture (PCAP) data, and diverse data products for \"at scale\" algorithm pipeline development. D4M (Dynamic Distributed Dimensional Data Model) combines the power of spars","authors_text":"Albert Reuther, Andrew Prout, Antonio Rosa, Bill Bergeron, Chansup Byun, Charles Yee, David Bestor, Jeremy Kepner, Julie Mullen, Lauren Milechin, Matthew Hubbell, Micheal Houle, Micheal Jones, Peter Michaleas, Siddharth Samsi, Vijay Gadepally, William Arcand","cross_cats":["cs.CR"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2018-08-25T04:06:12Z","title":"Hyperscaling Internet Graph Analysis with D4M on the MIT SuperCloud"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1808.08353","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:4da2673655c08cce1070fdae7401cf6d2aeacfb956f23570a0e83df0c7a6b268","target":"record","created_at":"2026-05-18T00:07:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"2a4d6ac91b44200c2dfc43cc9b3808cfbe1d7e8999f34a63b6f2449572374b63","cross_cats_sorted":["cs.CR"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.DC","submitted_at":"2018-08-25T04:06:12Z","title_canon_sha256":"2679c0cb7edffdea622ac5850db2127614b365ea106e05be967d8b4fbae573e2"},"schema_version":"1.0","source":{"id":"1808.08353","kind":"arxiv","version":1}},"canonical_sha256":"605ec726635b32a23089b9ab152b396c8d28cd291328211af5d9726897d3f6cd","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"605ec726635b32a23089b9ab152b396c8d28cd291328211af5d9726897d3f6cd","first_computed_at":"2026-05-18T00:07:16.822025Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:07:16.822025Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"HZ8w8XhNi/8eut93fMN04skObqDPWim8Pnz/HuYx48WlFVLzUMtjdgjxw3UB98JGcfRjmiXC5uKNQ2vOshSgBA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:07:16.822623Z","signed_message":"canonical_sha256_bytes"},"source_id":"1808.08353","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:4da2673655c08cce1070fdae7401cf6d2aeacfb956f23570a0e83df0c7a6b268","sha256:18f6e05a3787ced25d54e5f9b67ffa0e0226058a371a9df892dcc04a0448f038"],"state_sha256":"05e72b121c71eefa0a90aa6a892818d5c1718e562c398f61b94b088b2a348f57"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"RRSXEIt5HuBCNSbbkCaeT+tKrRav0GqfFy2t40E1SLXUYYksF0ayOosvu5NtGV6n1G4MZdZ6DZZdykrcMmU9BA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-24T15:56:01.588574Z","bundle_sha256":"5b28e0ffb945232af0c3338dc02efbc32fb85152a11c8c9df70d450cb6bcc6cd"}}