{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:01:54Z","timestamp":1725544914105},"publisher-location":"London","reference-count":16,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781848827646"},{"type":"electronic","value":"9781848827653"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-84882-765-3_10","type":"book-chapter","created":{"date-parts":[[2010,2,5]],"date-time":"2010-02-05T13:11:27Z","timestamp":1265375487000},"page":"219-238","source":"Crossref","is-referenced-by-count":2,"title":["Fast Packet Pattern-Matching Algorithms"],"prefix":"10.1007","author":[{"given":"Fang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Yanlei","family":"Diao","sequence":"additional","affiliation":[]},{"given":"Randy H.","family":"Katz","sequence":"additional","affiliation":[]},{"given":"T. V.","family":"Lakshman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,20]]},"reference":[{"key":"10_CR1_10","unstructured":"Bro intrusion detection system. \n                    http:\/\/bro-ids.org\/Overview.html\n                    \n                  ."},{"key":"10_CR2_10","unstructured":"Gnu grep tool. \n                    http:\/\/www.gnu.org\/software\/grep\/\n                    \n                  ."},{"key":"10_CR3_10","unstructured":"Snort network intrusion detection system. \n                    http:\/\/www.snort.org\n                    \n                  ."},{"key":"10_CR4_10","volume-title":"Compilers: principles, techniques, and tools","author":"AV Aho","year":"1986","unstructured":"A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: principles, techniques, and tools. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1986."},{"issue":"4","key":"10_CR5_10","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1145\/958942.958947","volume":"28","author":"Y Diao","year":"2003","unstructured":"Y. Diao, M. Altinel, M. J. Franklin, H. Zhang, and P. Fischer. Path sharing and predicate evaluation for high-performance xml filtering. ACM Trans. Database Syst., 28(4):467\u2013516, 2003.","journal-title":"ACM Trans. Database Syst."},{"issue":"4","key":"10_CR6_10","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1145\/1042046.1042051","volume":"29","author":"TJ Green","year":"2004","unstructured":"T. J. Green, A. Gupta, G. Miklau, M. Onizuka, and D. Suciu. Processing xml streams with deterministic automata and stream indexes. ACM Trans. Database Syst., 29(4):752\u2013788, 2004.","journal-title":"ACM Trans. Database Syst."},{"issue":"4","key":"10_CR7_10","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1145\/1042046.1042051","volume":"29","author":"TJ Green","year":"2004","unstructured":"T. J. Green, A. Gupta, G. Miklau, M. Onizuka, and D. Suciu. Processing xml streams with deterministic automata and stream indexes. ACM Trans. Database Syst., 29(4):752\u2013788, 2004.","journal-title":"ACM Trans. Database Syst."},{"key":"10_CR8_10","volume-title":"Introduction to Automata Theory, Languages, and Computation (3rd Edition)","author":"JE Hopcroft","year":"2006","unstructured":"J. E. Hopcroft, R. Motwani, and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation (3rd Edition). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2006."},{"key":"10_CR9_10","doi-asserted-by":"crossref","unstructured":"T. Johnson, S. Muthukrishnan, and I. Rozenbaum. Monitoring regular expressions on out-of-order streams. In ICDE, 2007.","DOI":"10.1109\/ICDE.2007.369001"},{"key":"10_CR10_10","doi-asserted-by":"crossref","unstructured":"S. Kumar, B. Chandrasekaran, J. Turner, and G. Varghese. Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. In ANCS \u201907: Proceedings of the 2007 ACM\/IEEE Symposium on Architecture for networking and communications systems, pages 155\u2013164, 2007.","DOI":"10.1145\/1323548.1323574"},{"key":"10_CR11_10","doi-asserted-by":"crossref","unstructured":"S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In SIGCOMM \u201906: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 339\u2013350, 2006.","DOI":"10.1145\/1159913.1159952"},{"key":"10_CR12_10","unstructured":"J. Levandoski, E. Sommer, and M. Strait. Application layer packet classifier for linux. \n                    http:\/\/l7-filter.sourceforge.net\/\n                    \n                  ."},{"key":"10_CR13_10","unstructured":"V. Paxson. Flex: A fast scanner generator. \n                    http:\/\/dinosaur.compilertools.net\/flex\/index.html\n                    \n                  ."},{"key":"10_CR14_10","doi-asserted-by":"crossref","unstructured":"R. Sommer and V. Paxson. Enhancing byte-level network intrusion detection signatures with context. In CCS \u201903: Proceedings of the 10th ACM conference on Computer and communications security, pages 262\u2013271, 2003.","DOI":"10.1145\/948109.948145"},{"key":"10_CR15_10","unstructured":"Venkat. Yahoo messenger protocol. \n                    http:\/\/www.venkydude.com\/articles\/yahoo.htm\/\n                    \n                  ."},{"key":"10_CR16_10","doi-asserted-by":"crossref","unstructured":"F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS \u201906: Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems, pages 93\u2013102, 2006.","DOI":"10.1145\/1185347.1185360"}],"container-title":["Computer Communications and Networks","Algorithms for Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-84882-765-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T04:47:30Z","timestamp":1552366050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-84882-765-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9781848827646","9781848827653"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-84882-765-3_10","relation":{},"ISSN":["1617-7975"],"issn-type":[{"type":"print","value":"1617-7975"}],"subject":[],"published":{"date-parts":[[2010]]}}}