{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:44:48Z","timestamp":1725518688470},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/issa.2013.6641052","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:20:04Z","timestamp":1383074404000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A high-level architecture for efficient packet trace analysis on GPU co-processors"],"prefix":"10.1109","author":[{"given":"Alastair","family":"Nottingham","sequence":"first","affiliation":[]},{"given":"Barry","family":"Irwin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"115","article-title":"Pathfinder: A pattern-based packet classifier","author":"bailey","year":"1994","journal-title":"Proceedings of the First Symposium on Operating Systems Design and Implementation Ser OSDI '94"},{"journal-title":"Nvidia CUDA C Best Practices Guide Version 3 1","year":"0","key":"18"},{"key":"15","first-page":"2","article-title":"The bsd packet filter: A new architecture for user-level packet capture","author":"mccanne","year":"1993","journal-title":"USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings"},{"key":"16","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","article-title":"Gnort: High performance network intrusion detection using graphics processors","author":"vasiliadis","year":"2008","journal-title":"RAID '08 Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1108956.1108958"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316214"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1583991.1584044"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1508128.1508162"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879149"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028794"},{"journal-title":"A Framework for the Application of Network Telescope Sensors in a Global IP Network","year":"2011","author":"irwin","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2389836.2389877"},{"journal-title":"Nvidia CUDA C Programming Guide Version 3 1","year":"0","key":"7"},{"journal-title":"Libpcap File Format","year":"2005","author":"ulf lamping","key":"6"},{"journal-title":"WinPcap documentation","year":"0","key":"5"},{"journal-title":"Gpf A Framework for General Packet Classification on Gpu Co-processors","year":"2012","author":"nottingham","key":"4"},{"journal-title":"Better Performance at Lower Occupancy","year":"2010","author":"volkov","key":"9"},{"journal-title":"The Definitive ANTLR Reference Building Domain-Specific Languages","year":"2008","author":"parr","key":"8"}],"event":{"name":"2013 Information Security for South Africa","start":{"date-parts":[[2013,8,14]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621627\/6641027\/06641052.pdf?arnumber=6641052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T21:01:52Z","timestamp":1498078912000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6641052\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/issa.2013.6641052","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}