{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:06:17Z","timestamp":1704931577092},"reference-count":4,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2010]]},"DOI":"10.1587\/transcom.e93.b.2440","type":"journal-article","created":{"date-parts":[[2010,9,2]],"date-time":"2010-09-02T06:14:30Z","timestamp":1283408070000},"page":"2440-2442","source":"Crossref","is-referenced-by-count":1,"title":["A Hardware-Efficient Pattern Matching Architecture Using Process Element Tree for Deep Packet Inspection"],"prefix":"10.23919","volume":"E93-B","author":[{"given":"Seongyong","family":"AHN","sequence":"first","affiliation":[{"name":"School of Electrical & Electronic Eng., Yonsei University"}]},{"given":"Hyejeong","family":"HONG","sequence":"additional","affiliation":[{"name":"School of Electrical & Electronic Eng., Yonsei University"}]},{"given":"HyunJin","family":"KIM","sequence":"additional","affiliation":[{"name":"School of Electrical & Electronic Eng., Yonsei University"}]},{"given":"Jin-Ho","family":"AHN","sequence":"additional","affiliation":[{"name":"Dep. of Electronic Eng., Hoseo University"}]},{"given":"Dongmyong","family":"BAEK","sequence":"additional","affiliation":[{"name":"Next Generation Ethernet Research Team, ETRI"}]},{"given":"Sungho","family":"KANG","sequence":"additional","affiliation":[{"name":"School of Electrical & Electronic Eng., Yonsei University"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] Y.K. Chang, M.L. Tsai, and Y.R. Chung, “Multi-character processor array for pattern matching in network intrusion detection system, ” Proc. AINA, pp.991-996, 2008.","DOI":"10.1109\/AINA.2008.119"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] Y.H. Cho and W.H. Mangione-Smith, “Deep network packet filter design for reconfigurable devices, ” ACM Trans. ECS, vol.7, no.2, article no.21, 2008.","DOI":"10.1145\/1331331.1331345"},{"key":"3","unstructured":"[3] S. Ahn, H. Hong, H. Kim, J. Ahn, D. Baek, and S. Kang, “A hardware-efficient multi-character string matching architecture using brute-force algorithm, ” Proc. ISOCC, pp.464-467, 2009."},{"key":"4","unstructured":"[4] Snort, intrusion detection system, Visit www.snort.org"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transcom\/E93.B\/9\/E93.B_9_2440\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:53:35Z","timestamp":1704898415000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transcom\/E93.B\/9\/E93.B_9_2440\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":4,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2010]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.e93.b.2440","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}