{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:54:29Z","timestamp":1729641269669,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/infcom.2010.5462268","type":"proceedings-article","created":{"date-parts":[[2010,5,12]],"date-time":"2010-05-12T20:54:40Z","timestamp":1273697680000},"page":"1-5","source":"Crossref","is-referenced-by-count":4,"title":["High Performance Dictionary-Based String Matching for Deep Packet Inspection"],"prefix":"10.1109","author":[{"given":"Yi-Hua E.","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hoang","family":"Le","sequence":"additional","affiliation":[]},{"given":"Viktor K.","family":"Prasanna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Pipelined Architecture for Multi-String Matching","volume":"7","author":"pao","year":"2008","journal-title":"IEEE Computer Architecture Letters"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320212"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968312"},{"journal-title":"Field Programmable Custom Computing Machines","article-title":"A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs","year":"2004","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639434"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2009.5161043"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974078"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","article-title":"Gnort: High Performance Network Intrusion Detection Using Graphics Processors","volume":"5230","author":"vasiliadis","year":"2008","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536300"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.42"},{"key":"ref7","article-title":"Pipelined Multi-Core Architecture on FPGA for Large Dictionary String Matching","author":"wang","year":"2009","journal-title":"Field Programmable Custom Computing Machines"},{"year":"0","key":"ref2","article-title":"SNORT"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.204"},{"journal-title":"Clam AntiVirus","year":"0","key":"ref1"}],"event":{"name":"IEEE INFOCOM 2010 - IEEE Conference on Computer Communications","start":{"date-parts":[[2010,3,14]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2010,3,19]]}},"container-title":["2010 Proceedings IEEE INFOCOM"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5461675\/5461899\/05462268.pdf?arnumber=5462268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:07:39Z","timestamp":1497859659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5462268\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/infcom.2010.5462268","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}