{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T18:56:15Z","timestamp":1725648975707},"reference-count":18,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2011,2,1]],"date-time":"2011-02-01T00:00:00Z","timestamp":1296518400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Parallel and Distributed Computing"],"published-print":{"date-parts":[[2011,2]]},"DOI":"10.1016\/j.jpdc.2010.07.005","type":"journal-article","created":{"date-parts":[[2010,7,26]],"date-time":"2010-07-26T08:14:20Z","timestamp":1280132060000},"page":"225-235","source":"Crossref","is-referenced-by-count":10,"title":["Massively parallel acceleration of a document-similarity classifier to detect web attacks"],"prefix":"10.1016","volume":"71","author":[{"given":"Craig","family":"Ulmer","sequence":"first","affiliation":[]},{"given":"Maya","family":"Gokhale","sequence":"additional","affiliation":[]},{"given":"Brian","family":"Gallagher","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Top","sequence":"additional","affiliation":[]},{"given":"Tina","family":"Eliassi-Rad","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jpdc.2010.07.005_br000005","series-title":"FPGA\u201904: Proceedings of the 2004 ACM\/SIGDA 12th International Symposium on Field Programmable Gate Arrays","first-page":"223","article-title":"Time and area efficient pattern matching on FPGAs","author":"Baker","year":"2004"},{"issue":"7","key":"10.1016\/j.jpdc.2010.07.005_br000010","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","article-title":"Space\/time trade-offs in hash coding with allowable errors","volume":"13","author":"Bloom","year":"1970","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jpdc.2010.07.005_br000015","doi-asserted-by":"crossref","unstructured":"T. Chen, Z. Zheng, N. Zhang, J. Chen, Heterogeneous multi-core design for information retrieval efficiency on the vector space model, in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on, vol. 5, 2008, pp. 353\u2013357. doi: http:\/\/doi.ieeecomputersociety.org\/10.1109\/FSKD.2008.229.","DOI":"10.1109\/FSKD.2008.229"},{"key":"10.1016\/j.jpdc.2010.07.005_br000020","doi-asserted-by":"crossref","unstructured":"A. Das, S. Misra, S. Joshi, J. Zambreno, G. Memik, A. Choudhary, An efficient fpga implementation of principle component analysis based network intrusion detection system, in: Design, Automation and Test in Europe Conference and Exhibition 0, 2008, pp. 1160\u20131165. doi: http:\/\/doi.ieeecomputersociety.org\/10.1109\/DATE.2008.4484835.","DOI":"10.1109\/DATE.2008.4484835"},{"key":"10.1016\/j.jpdc.2010.07.005_br000025","unstructured":"Ludovic Denoyer, Hung Son Nguyen, ECML\/PKDD 2007 discovery challenge, 2007. Available: http:\/\/www.ecmlpkdd.org\/."},{"key":"10.1016\/j.jpdc.2010.07.005_br000030","unstructured":"M. Exbrayat, Analyzing web traffic: a boundaries signature approach, in: Proceedings of the ECML\/PKDD 2007 Discovery Challenge, 2007, pp. 53\u201364."},{"key":"10.1016\/j.jpdc.2010.07.005_br000035","unstructured":"B. Gallagher, T. Eliassi-Rad, Classification of http attacks: a study on the ECML\/PKDD 2007 discovery challenge, TR-414570."},{"key":"10.1016\/j.jpdc.2010.07.005_br000040","unstructured":"LLNL, Data-centric computing architectures, 2009. https:\/\/computation.llnl.gov\/casc\/dcca-pub\/dcca\/Downloads.html."},{"key":"10.1016\/j.jpdc.2010.07.005_br000045","series-title":"Introduction to Information Retrieval","author":"Manning","year":"2008"},{"key":"10.1016\/j.jpdc.2010.07.005_br000050","series-title":"Advanced Data Mining Techniques","author":"Olson","year":"2008"},{"key":"10.1016\/j.jpdc.2010.07.005_br000055","unstructured":"K. Pachopoulos, D. Valsamou, D. Mavroeidis, M. Vazirgiannis, Feature extraction from web traffic data for the application of data mining algorithms in attack identification, in: Proceedings of the ECML\/PKDD 2007 Discovery Challenge, 2007, pp. 65\u201370."},{"issue":"6","key":"10.1016\/j.jpdc.2010.07.005_br000060","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1145\/78973.78978","article-title":"Fast hashing of variable-length text strings","volume":"33","author":"Pearson","year":"1990","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jpdc.2010.07.005_br000065","unstructured":"C. Rassi, J. Brissaud, G. Dray, P. Poncelet, M. Roche, M. Teisseire, Web analyzing traffic challenge: description and results, in: Proceedings of the ECML\/PKDD 2007 Discovery Challenge, 2007, pp. 47\u201352."},{"key":"10.1016\/j.jpdc.2010.07.005_br000070","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","article-title":"Term-weighting approaches in automatic text retrieval","author":"Salton","year":"1988","journal-title":"Information Processing & Management"},{"key":"10.1016\/j.jpdc.2010.07.005_br000075","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/361219.361220","article-title":"A vector space model for automatic indexing","volume":"11","author":"Salton","year":"1975","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jpdc.2010.07.005_br000080","series-title":"FPGA\u201905: Proceedings of the 2005 ACM\/SIGDA 13th International Symposium on Field-Programmable Gate Arrays","first-page":"238","article-title":"Efficient packet classification for network intrusion detection using FPGA","author":"Song","year":"2005"},{"key":"10.1016\/j.jpdc.2010.07.005_br000085","unstructured":"ITOC, West point data set, 2009. http:\/\/www.itoc.usma.edu\/research\/dataset."},{"key":"10.1016\/j.jpdc.2010.07.005_br000090","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2005"}],"container-title":["Journal of Parallel and Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731510001346?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0743731510001346?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T16:32:03Z","timestamp":1559320323000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0743731510001346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,2]]}},"alternative-id":["S0743731510001346"],"URL":"https:\/\/doi.org\/10.1016\/j.jpdc.2010.07.005","relation":{},"ISSN":["0743-7315"],"issn-type":[{"value":"0743-7315","type":"print"}],"subject":[],"published":{"date-parts":[[2011,2]]}}}