{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:08:07Z","timestamp":1742382487732},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fccm.2004.25","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:17Z","timestamp":1103776457000},"page":"125-134","source":"Crossref","is-referenced-by-count":71,"title":["Deep Packet Filter with Dedicated Logic and Read Only Memories"],"prefix":"10.1109","author":[{"given":"Y.H.","family":"Cho","sequence":"first","affiliation":[]},{"given":"W.H.","family":"Mangione-Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"A reconfi gurable content addressable memory","author":"steven","year":"2000","journal-title":"IPDPS 2000 Workshop"},{"key":"11","article-title":"Fast regular expression matching using FPGAs","author":"sidhu","year":"2001","journal-title":"IEEE Symposium on Field-Programmable Custom Computing Machines"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45234-8_85","article-title":"Fast, large-scale string match for a 10Gbps FPGA-based network intrusion detection system","author":"sourdis","year":"2003","journal-title":"Conference on Field Programmable Logic and Applications"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.50"},{"key":"2","first-page":"452","article-title":"Deep network packet filter design for reconfi gurable devices","author":"cho","year":"2002","journal-title":"12th Conference on Field Programmable Logic and Applications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"10","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proc 1999 USENIX LISA Conference"},{"key":"7","first-page":"404","article-title":"Granidt: Towards gigabit rate network intrusion detection technology","author":"gokhale","year":"2002","journal-title":"12th Conference on Field Programmable Logic and Applications"},{"key":"6","article-title":"Assisting network intrusion detection with reconfi gurable hardware","author":"franklin","year":"2002","journal-title":"Proceedings of the IEEE Symposium on FPGA's for Custom Computing Machines"},{"key":"5","article-title":"Firewall evolution - Deep packet inspection","author":"dubrawsky","year":"2003","journal-title":"Infocus"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2003.1227239"},{"key":"8","article-title":"Internet worm and virus protection in dynamically reconfi gurable hardware","author":"lockwood","year":"2003","journal-title":"Military and Aerospace Programmable Logic Devices (MAPLD) Conf"}],"event":{"name":"12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines","location":"Napa, CA, USA"},"container-title":["12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9418\/29894\/01364623.pdf?arnumber=1364623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T09:42:44Z","timestamp":1497606164000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1364623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/fccm.2004.25","relation":{},"subject":[]}}