{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:54:01Z","timestamp":1743011641776,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319018539"},{"type":"electronic","value":"9783319018546"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-01854-6_45","type":"book-chapter","created":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T06:47:25Z","timestamp":1375944445000},"page":"439-448","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time Polymorphic Aho-Corasick Automata for Heterogeneous Malicious Code Detection"],"prefix":"10.1007","author":[{"given":"Ciprian","family":"Pungila","sequence":"first","affiliation":[]},{"given":"Viorel","family":"Negru","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"45_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A. Aho","year":"1975","unstructured":"Aho, A., Corasick, M.: Efficient string matching: An Aid to blbiographic search. CACM\u00a018(6), 333\u2013340 (1975)","journal-title":"CACM"},{"key":"45_CR2","unstructured":"Cha, S.K., Moraru, I., Jang, J., Truelove, J., Brumley, D., Andersen, D.G.: Split Screen: Enabling Efficient, Distributed Malware Detection. In: Proc. 7th USENIX NSDI (2010)"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Lee, T.H.: Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications. In: Proceedings of 16th International Conference on Computer Communications and Networks, ICCN (2007)","DOI":"10.1109\/ICCCN.2007.4317914"},{"key":"45_CR4","unstructured":"Snort, \n                    http:\/\/www.snort.org\/"},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V. Paxson","year":"1999","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks\u00a031, 2435\u20132463 (1999)","journal-title":"Computer Networks"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Pungila, C.: A Bray-Curtis Weighted Automaton for Detecting Malicious Code Through System-Call Analysis. In: 11th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), pp. 392\u2013400 (2009)","DOI":"10.1109\/SYNASC.2009.41"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Arshad, J., Townend, P., Xu, J.: A novel intrusion severity analysis approach for Clouds. Future Generation Computer Systems (2011), doi:10.1016\/j.future.2011.08.009","DOI":"10.1016\/j.future.2011.08.009"},{"issue":"2","key":"45_CR8","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","volume":"11","author":"E. Corchado","year":"2011","unstructured":"Corchado, E., Herrero, A.: Neural visualization of network traffic data for intrusion detection. Applied Soft Computing\u00a011(2), 2042\u20132056 (2011)","journal-title":"Applied Soft Computing"},{"key":"45_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.proeng.2012.01.827","volume":"30","author":"M. Panda","year":"2012","unstructured":"Panda, M., Abraham, A., Patra, M.R.: Hybrid Intelligent Approach for Network Intrusion Detection. Procedia Engineering\u00a030, 1\u20139 (2012), doi:10.1016\/j.proeng.2012.01.827","journal-title":"Procedia Engineering"},{"key":"45_CR10","unstructured":"Wang, Z., Xu, G., Li, H., Zhang, M.: A Fast and Accurate Method for Approximate String Searc. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol.\u00a01, pp. 52\u201361 (2011)"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Pungila, C.: Improved file-carving through data-parallel pattern matching for data forensics. In: 7th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 197\u2013202 (2012)","DOI":"10.1109\/SACI.2012.6250001"},{"key":"45_CR12","series-title":"AISC","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-33018-6_8","volume-title":"International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions","author":"C. Pungila","year":"2013","unstructured":"Pungila, C.: Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection Systems. In: Herrero, \u00c1., Sn\u00e1\u0161el, V., Abraham, A., Zelinka, I., Baruque, B., Quinti\u00e1n, H., Calvo, J.L., Sedano, J., Corchado, E. (eds.) Int. Joint Conf. CISIS\u201912-ICEUTE\u201912-SOCO\u201912. AISC, vol.\u00a0189, pp. 77\u201386. Springer, Heidelberg (2013)"},{"key":"45_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33383-5_22","volume-title":"Information Security","author":"C. Pungila","year":"2012","unstructured":"Pungila, C., Negru, V.: A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol.\u00a07483, pp. 354\u2013369. Springer, Heidelberg (2012)"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Lee, V.W., Kim, C., Chhugani, J., Deisher, M., Kim, D. Nguyen, A.D., Satish, N., Smelyanskiy, M., Chennupaty, S., Hammarlund, P., Singhal, R., Dubey, P.: Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU. In: Proceedings of the 37th Annual International Symposium on Computer Architecture (ISCA 2010), pp. 451\u2013460. ACM, New York, \n                    http:\/\/doi.acm.org\/10.1145\/1815961.1816021\n                  , doi:10.1145\/1815961.1816021","DOI":"10.1145\/1815961.1816021"},{"key":"45_CR15","unstructured":"Clam AntiVirus, \n                    http:\/\/www.clamav.net"},{"issue":"2","key":"45_CR16","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"R.W. Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell System Technical Journal\u00a029(2), 147\u2013160 (1950)","journal-title":"Bell System Technical Journal"},{"key":"45_CR17","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"47","author":"S.B. Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. J. Mol. Biol.\u00a047, 443\u2013453 (1970)","journal-title":"J. Mol. Biol."},{"key":"45_CR18","unstructured":"Bray-Curtis dissimilarity, \n                    http:\/\/www.code10.info\/index.php?view=article&id=46"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01854-6_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T15:05:42Z","timestamp":1720710342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01854-6_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319018539","9783319018546"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01854-6_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}