{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:45:44Z","timestamp":1730317544940,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T00:00:00Z","timestamp":1410220800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,9]]},"DOI":"10.1145\/2659651.2659700","type":"proceedings-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T13:41:52Z","timestamp":1418737312000},"page":"295-301","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["GLoP"],"prefix":"10.1145","author":[{"given":"Xavier J. A.","family":"Bellekens","sequence":"first","affiliation":[{"name":"Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK"}]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK"}]},{"given":"Robert C.","family":"Atkinson","sequence":"additional","affiliation":[{"name":"Department of Electronic and Electrical Engineering, University of Strathclyde, Glasgow, G1 1XW, UK"}]},{"given":"Craig","family":"Renfrew","sequence":"additional","affiliation":[{"name":"Agilent Technologies UK, 5 Lochside Avenue, Edinburgh, EH12 9DJ, GB"}]},{"given":"Tony","family":"Kirkham","sequence":"additional","affiliation":[{"name":"Agilent Technologies UK, 5 Lochside Avenue, Edinburgh, EH12 9DJ, GB"}]}],"member":"320","published-online":{"date-parts":[[2014,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.72"},{"key":"e_1_3_2_1_2_1","first-page":"452","volume-title":"SOUTHEASTCON '09","author":"Harwayne-Gidansky J.","year":"2009","unstructured":"J. Harwayne-Gidansky , D. Stefan , and I. Dalal , \" FPGA-based SoC for real-time network intrusion detection using counting bloom filters,\" in Southeastcon, 2009 . SOUTHEASTCON '09 . IEEE, pp. 452 -- 458 , March 2009 . J. Harwayne-Gidansky, D. Stefan, and I. Dalal, \"FPGA-based SoC for real-time network intrusion detection using counting bloom filters,\" in Southeastcon, 2009. SOUTHEASTCON '09. IEEE, pp. 452--458, March 2009."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.35"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"I.\n Sourdis\n and \n D.\n Pnevmatikatos \"\n Fast large-scale string match for a 10gbps fpga-based network intrusion detection system \" in Field Programmable Logic and Application\n (P. Cheung and G. Constantinides eds.) vol. \n 2778\n of \n Lecture Notes in Computer Science pp. \n 880\n --\n 889 Springer Berlin Heidelberg 2003\n . I. Sourdis and D. Pnevmatikatos \"Fast large-scale string match for a 10gbps fpga-based network intrusion detection system \" in Field Programmable Logic and Application (P. Cheung and G. Constantinides eds.) vol. 2778 of Lecture Notes in Computer Science pp. 880--889 Springer Berlin Heidelberg 2003.","DOI":"10.1007\/978-3-540-45234-8_85"},{"key":"e_1_3_2_1_5_1","first-page":"322","volume-title":"FCCM 2004. 12th Annual IEEE Symposium on","author":"Attig M.","year":"2004","unstructured":"M. Attig , S. Dharmapurikar , and J. Lockwood , \" Implementation results of bloom filters for string matching,\" in Field-Programmable Custom Computing Machines, 2004 . FCCM 2004. 12th Annual IEEE Symposium on , pp. 322 -- 323 , April 2004 . M. Attig, S. Dharmapurikar, and J. Lockwood, \"Implementation results of bloom filters for string matching,\" in Field-Programmable Custom Computing Machines, 2004. FCCM 2004. 12th Annual IEEE Symposium on, pp. 322--323, April 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2012.28"},{"key":"e_1_3_2_1_7_1","first-page":"194","volume-title":"2013 IEEE","author":"Shu X.","year":"2013","unstructured":"X. Shu , J. Smiy , D. Daphne Yao , and H. Lin , \" Massive distributed and parallel log analysis for organizational security,\" in Globecom Workshops (GC Wkshps) , 2013 IEEE , pp. 194 -- 199 , IEEE, 2013 . X. Shu, J. Smiy, D. Daphne Yao, and H. Lin, \"Massive distributed and parallel log analysis for organizational security,\" in Globecom Workshops (GC Wkshps), 2013 IEEE, pp. 194--199, IEEE, 2013."},{"key":"e_1_3_2_1_8_1","first-page":"285","volume-title":"2011 IEEE International Conference on","author":"Yang S.-F.","year":"2011","unstructured":"S.-F. Yang , W.-Y. Chen , and Y.-T. Wang , \"ICAS : An inter-vm IDS log cloud analysis system,\" in Cloud Computing and Intelligence Systems (CCIS) , 2011 IEEE International Conference on , pp. 285 -- 289 , Sept 2011 . S.-F. Yang, W.-Y. Chen, and Y.-T. Wang, \"ICAS: An inter-vm IDS log cloud analysis system,\" in Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on, pp. 285--289, Sept 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Gerhards \"The syslog protocol \" march 2009. Request for Comments RFC 5424 (Proposed Standard) IETF. R. Gerhards \"The syslog protocol \" march 2009. Request for Comments RFC 5424 (Proposed Standard) IETF.","DOI":"10.17487\/rfc5424"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"e_1_3_2_1_11_1","volume-title":"Networking and Broadcasting (PGNet2013)","author":"Bellekens X.","year":"2013","unstructured":"X. Bellekens , I. Andonovic , R. Atkinson , C. Renfrew , and T. Kirkham , \" Investigation of GPU-based pattern matching,\" in The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications , Networking and Broadcasting (PGNet2013) , 2013 . X. Bellekens, I. Andonovic, R. Atkinson, C. Renfrew, and T. Kirkham, \"Investigation of GPU-based pattern matching,\" in The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet2013), 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/0206024"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCSS.2012.22"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"e_1_3_2_1_17_1","first-page":"186","volume-title":"Modeling and Simulation, 2007. IC-SAMOS 2007. International Conference on","author":"Dimopoulos V.","year":"2007","unstructured":"V. Dimopoulos , I. Papaefstathiou , and D. Pnevmatikatos , \" A memory-efficient reconfigurable aho-corasick FSM implementation for intrusion detection systems,\" in Embedded Computer Systems: Architectures , Modeling and Simulation, 2007. IC-SAMOS 2007. International Conference on , pp. 186 -- 193 , July 2007 . V. Dimopoulos, I. Papaefstathiou, and D. Pnevmatikatos, \"A memory-efficient reconfigurable aho-corasick FSM implementation for intrusion detection systems,\" in Embedded Computer Systems: Architectures, Modeling and Simulation, 2007. IC-SAMOS 2007. International Conference on, pp. 186--193, July 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.61"},{"key":"e_1_3_2_1_19_1","first-page":"1030","volume-title":"2011 IEEE Conference on","author":"Jianlong T.","year":"2011","unstructured":"T. Jianlong , L. Xia , L. Yanbing , and L. Ping , \" Speeding up pattern matching by optimal partial string extraction,\" in Computer Communications Workshops (INFOCOM WKSHPS) , 2011 IEEE Conference on , pp. 1030 -- 1035 , April 2011 . T. Jianlong, L. Xia, L. Yanbing, and L. Ping, \"Speeding up pattern matching by optimal partial string extraction,\" in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pp. 1030--1035, April 2011."},{"key":"e_1_3_2_1_20_1","first-page":"1574","volume-title":"2010 The 12th International Conference on","volume":"2","author":"Jung W.-S.","year":"2010","unstructured":"W.-S. Jung and T.-G. Kwon , \"An independently partial pattern matching for content inspection at multi gigabit networks,\" in Advanced Communication Technology (ICACT) , 2010 The 12th International Conference on , vol. 2 , pp. 1574 -- 1579 , Feb 2010 . W.-S. Jung and T.-G. Kwon, \"An independently partial pattern matching for content inspection at multi gigabit networks,\" in Advanced Communication Technology (ICACT), 2010 The 12th International Conference on, vol. 2, pp. 1574--1579, Feb 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"G.\n Vasiliadis\n and \n S.\n Ioannidis \"\n Gravity: A massively parallel antivirus engine \" in Recent Advances in Intrusion Detection\n (S. Jha R. Sommer and C. Kreibich eds.) vol. \n 6307\n of \n Lecture Notes in Computer Science pp. \n 79\n --\n 96 Springer Berlin Heidelberg 2010\n . G. Vasiliadis and S. Ioannidis \"Gravity: A massively parallel antivirus engine \" in Recent Advances in Intrusion Detection (S. Jha R. Sommer and C. Kreibich eds.) vol. 6307 of Lecture Notes in Computer Science pp. 79--96 Springer Berlin Heidelberg 2010.","DOI":"10.1007\/978-3-642-15512-3_5"},{"key":"e_1_3_2_1_22_1","volume-title":"Programming Massively Parallel Processors: A Hands-on Approach","author":"Kirk D.","year":"2012","unstructured":"D. Kirk and W. Hwu , Programming Massively Parallel Processors: A Hands-on Approach . Elsevier Science , 2012 . D. Kirk and W. Hwu, Programming Massively Parallel Processors: A Hands-on Approach. Elsevier Science, 2012."},{"key":"e_1_3_2_1_23_1","unstructured":"Nvidia \"Cuda C programming guide \" 2013. http:\/\/docs.nvidia.com\/cuda\/. Nvidia \"Cuda C programming guide \" 2013. http:\/\/docs.nvidia.com\/cuda\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.43"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.254"},{"key":"e_1_3_2_1_26_1","first-page":"76","volume-title":"2001 International Symposium on.","author":"Yazdani N.","year":"2001","unstructured":"N. Yazdani and P. Min , \" Prefix trees: new efficient data structures for matching strings of different lengths,\" in Database Engineering and Applications , 2001 International Symposium on. , pp. 76 -- 85 , 2001 . N. Yazdani and P. Min, \"Prefix trees: new efficient data structures for matching strings of different lengths,\" in Database Engineering and Applications, 2001 International Symposium on., pp. 76--85, 2001."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"}],"event":{"name":"SIN '14: The 7th International Conference on Security of Information and Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SICSA The Scottish Informatics and Computer Science Alliance","University of Glasgow University of Glasgow"],"location":"Glasgow Scotland UK","acronym":"SIN '14"},"container-title":["Proceedings of the 7th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659651.2659700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T04:20:02Z","timestamp":1673670002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659700"}},"subtitle":["Enabling Massively Parallel Incident Response Through GPU Log Processing"],"short-title":[],"issued":{"date-parts":[[2014,9,9]]},"references-count":27,"alternative-id":["10.1145\/2659651.2659700","10.1145\/2659651"],"URL":"https:\/\/doi.org\/10.1145\/2659651.2659700","relation":{},"subject":[],"published":{"date-parts":[[2014,9,9]]},"assertion":[{"value":"2014-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}