{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T01:00:35Z","timestamp":1762390835161,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030120849"},{"type":"electronic","value":"9783030120856"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12085-6_11","type":"book-chapter","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T12:17:55Z","timestamp":1548764275000},"page":"122-133","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["CloudNet Anti-malware Engine: GPU-Accelerated Network Monitoring for Cloud Services"],"prefix":"10.1007","author":[{"given":"George","family":"Hatzivasilis","sequence":"first","affiliation":[]},{"given":"Konstantinos","family":"Fysarakis","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Askoxylakis","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Bilanakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"issue":"12","key":"11_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2017.1700212","volume":"55","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Shu, L., Leung, V.C.M., Guo, S., Zhang, Y., Yang, L.T.: Secure multimedia big data in trust-assisted sensor-cloud for smart city. IEEE Commun. Mag. 55(12), 24\u201330 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"11_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCOM.2017.1700142","volume":"55","author":"C Zhu","year":"2017","unstructured":"Zhu, C., Zhou, H., Leung, V.C.M., Wang, K., Zhang, Y., Yang, L.T.: Toward big data in green city. IEEE Commun. Mag. 55(11), 14\u201318 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"11_CR3","unstructured":"Antonakakis, M., et al.: Understanding the Mirai Botnet. In: 26th Usenix Security Symposium (SS), 16\u201318 August, Vancouver, BC, Canada, pp. 1093\u20131110 (2017)"},{"issue":"9","key":"11_CR4","doi-asserted-by":"publisher","first-page":"2304","DOI":"10.1109\/TMC.2015.2492545","volume":"15","author":"Z Lu","year":"2016","unstructured":"Lu, Z., Wang, W., Wang, C.: On the evolution and impact of mobile Botnets in wireless networks. IEEE Trans. Mob. Comput. 15(9), 2304\u20132316 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"11_CR5","unstructured":"NVIDIA Corporation, Santa Clara, California, USA. \n                      http:\/\/www.nvidia.com\/"},{"key":"11_CR6","unstructured":"Compute Unified Device Architecture (CUDA). \n                      http:\/\/www.nvidia.com\/object\/cuda_home_new.html"},{"key":"11_CR7","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family. \n                      http:\/\/keccak.noekeon.org\/"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-15512-3_5","volume-title":"Recent Advances in Intrusion Detection","author":"G Vasiliadis","year":"2010","unstructured":"Vasiliadis, G., Ioannidis, S.: GrAVity: a massively parallel antivirus engine. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 79\u201396. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-15512-3_5"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33383-5_22","volume-title":"Information Security","author":"C Pungila","year":"2012","unstructured":"Pungila, C., Negru, V.: A highly-efficient memory-compression approach for GPU-accelerated virus signature matching. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 354\u2013369. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-33383-5_22"},{"key":"11_CR10","unstructured":"Clam AntiVirus, Open Source (GPL) antivirus engine. \n                      http:\/\/www.clamav.net"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: high performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 116\u2013134. Springer, Heidelberg (2008). \n                      https:\/\/doi.org\/10.1007\/978-3-540-87403-4_7"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-04342-0_14","volume-title":"Recent Advances in Intrusion Detection","author":"G Vasiliadis","year":"2009","unstructured":"Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E.P., Ioannidis, S.: Regular expression matching on graphics hardware for intrusion detection. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 265\u2013283. Springer, Heidelberg (2009). \n                      https:\/\/doi.org\/10.1007\/978-3-642-04342-0_14"},{"issue":"6","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1109\/JIOT.2017.2752801","volume":"4","author":"G Hatzivasilis","year":"2017","unstructured":"Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. (IoT) 4(6), 2129\u20132141 (2017)","journal-title":"IEEE Internet Things J. (IoT)"},{"key":"11_CR14","unstructured":"Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: Real-time management of railway CPS. In: 5th EUROMICRO\/IEEE Workshop on Embedded and Cyber-Physical Systems, ECYPS 2017, 11\u201315 June, Bar, Montenegro. IEEE (2017)"},{"key":"11_CR15","first-page":"127","volume":"119","author":"G Hatzivasilis","year":"2018","unstructured":"Hatzivasilis, G., Fysarakis, K., Soultatos, O., Askoxylakis, I., Papaefstathiou, I., Demetriou, G.: The industrial internet of things as an enabler for a circular economy Hy-LP: a novel IIoT protocol, evaluated on a Wind Park\u2019s SDN\/NFV-enabled 5G industrial network. Comput. Commun. Spec. Issue Energy-aware Des. Sustain. 5G Netw. 119, 127\u2013137 (2018)","journal-title":"Comput. Commun. Spec. Issue Energy-aware Des. Sustain. 5G Netw."},{"key":"11_CR16","unstructured":"National Institute of Standards & Technology (NIST): SHA-3 Winner Announcement. \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/winner_sha-3.html"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Alexandris, G., Alexaki, S., Katos, V., Hatzivasilis, G.: Blockchains as enablers for auditing cooperative circular economy networks. In: 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2018, 17\u201319 September, Barcelona, Spain, pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/CAMAD.2018.8514985"},{"key":"11_CR18","unstructured":"NVIDIA Jetson TK1. \n                      http:\/\/www.nvidia.com\/object\/jetson-tk1-embedded-dev-kit.html"},{"key":"11_CR19","unstructured":"NVIDIA: GeForce GTX 1050. \n                      https:\/\/www.nvidia.com\/en-us\/geforce\/products\/10series\/geforce-gtx-1050\/"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO 1989 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). \n                      https:\/\/doi.org\/10.1007\/0-387-34805-0_21"},{"key":"11_CR21","unstructured":"Sevestre, G.: Keccak tree hashing on GPU, using NVIDIA CUDA API. \n                      https:\/\/sites.google.com\/site\/keccaktreegpu\/"}],"container-title":["Lecture Notes in Computer Science","Information and Operational Technology Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12085-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T06:38:59Z","timestamp":1558334339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12085-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030120849","9783030120856"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12085-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IOSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Information and Operational Technology Security Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iosec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.raid2018.org\/cipsecworkshop.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}