{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:39:48Z","timestamp":1743115188282,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_41","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"413-422","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Heterogeneous Approach to Building Compressed Automata for Malware Signature Matching"],"prefix":"10.1007","author":[{"given":"Ciprian","family":"Pungila","sequence":"first","affiliation":[]},{"given":"Viorel","family":"Negru","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"NVIDIA, NVIDIA CUDA Compute Unified Device Architecture Programming Guide, version 4.1., \n                    http:\/\/developer.download.nvidia.com\/compute\/DevZone\/docs\/html\/C\/doc\/CUDA_C_Programming_Guide.pdf","key":"41_CR1"},{"unstructured":"AMD, The HSA Architecture, \n                    http:\/\/developer.amd.com\/resources\/heterogeneous-computing\/what-is-heterogeneous-system-architecture-hsa\/","key":"41_CR2"},{"doi-asserted-by":"crossref","unstructured":"Vasiliadis, G.: GPU-assisted malware. In: 5th International Conference on Malicious and Unwanted Software (MALWARE) (2010)","key":"41_CR3","DOI":"10.1109\/MALWARE.2010.5665801"},{"key":"41_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-37300-8_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"P. Stewin","year":"2013","unstructured":"Stewin, P., Bystrov, I.: Understanding DMA Malware. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol.\u00a07591, pp. 21\u201341. Springer, Heidelberg (2013)"},{"unstructured":"Ladakis, E., Koromilas, L., Vasiliadis, G., Polychronakis, M., Ioannidis, S.: You Can Type, but You Can\u2019t Hide: A Stealthy GPU-based Keylogger. In: 6th European Workshop on System Security (EuroSec) (2013)","key":"41_CR5"},{"doi-asserted-by":"crossref","unstructured":"Herrero, A., Zurutuza, U., Corchado, E.: A Neural-Visualization IDS for Honeynet Data. Int. J. Neural Syst.\u00a022(2) (2012)","key":"41_CR6","DOI":"10.1142\/S0129065712500050"},{"issue":"1","key":"41_CR7","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.future.2010.12.017","volume":"29","author":"A. Herrero","year":"2013","unstructured":"Herrero, A., Navarro, M., Corchado, E., Juli\u00e1n, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst.\u00a029(1), 250\u2013261 (2013)","journal-title":"Future Generation Comp. Syst."},{"issue":"6","key":"41_CR8","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A. Aho","year":"1975","unstructured":"Aho, A., Corasick, M.: Efficient string matching: An Aid to bibliographic search. Communications of the ACM\u00a018(6), 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"41_CR9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.4018\/978-1-4666-4514-1.ch009","volume-title":"Architectures and Protocols for Secure Information Technology Infrastructures","author":"C. Pungila","year":"2014","unstructured":"Pungila, C., Negru, V.: Towards Building Efficient Malware Detection Engines Using Hybrid CPU\/GPU-Accelerated Approaches. In: Ruiz-Martinez, A., Marin-Lopez, R., Pereniguez-Garcia, F. (eds.) Architectures and Protocols for Secure Information Technology Infrastructures, pp. 237\u2013264. IGI Global, Hershey (2014)"},{"key":"41_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-09510-1_10","volume-title":"Automata, Languages and Programming","author":"B. Commentz-Walter","year":"1979","unstructured":"Commentz-Walter, B.: A string matching algorithm fast on the average. In: Maurer, H.A. (ed.) Automata, Languages and Programming. LNCS, vol.\u00a071, pp. 118\u2013132. Springer, Heidelberg (1979)"},{"unstructured":"Wu, S., Manber, U.: A fast algorithm for multi-pattern searching. Technical Report TR-94-17, 1\u201311 (2004)","key":"41_CR11"},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R.S. Boyer","year":"1977","unstructured":"Boyer, R.S., Moore, J.S.: A fast string searching algorithm. Communications of the ACM\u00a020, 762\u2013772 (1977)","journal-title":"Communications of the ACM"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-33383-5_22","volume-title":"Information Security","author":"C. Pungila","year":"2012","unstructured":"Pungila, C., Negru, V.: A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol.\u00a07483, pp. 354\u2013369. Springer, Heidelberg (2012)"},{"unstructured":"Clam AntiVirus, \n                    http:\/\/www.clamav.net","key":"41_CR14"},{"doi-asserted-by":"crossref","unstructured":"Pungila, C., Negru, V.: Real-Time Polymorphic Aho-Corasick Automata for Heterogeneous Malicious Code Detection. In: Herrero, A., Baruque, B., Klett, F., Abraham, A., Snasel, V., de Carvalho, A.C.P.L.F., Bringas, P.G., Zelinka, I., Quintian, H., Corchado, E. (eds.) International Joint Conference SOCO\u201913-CISIS\u201913-ICEUTE\u201913. AISC, vol.\u00a0239, pp. 439\u2013448. Springer, Heidelberg (2014)","key":"41_CR15","DOI":"10.1007\/978-3-319-01854-6_45"},{"doi-asserted-by":"crossref","unstructured":"Pungila, C., Reja, M., Negru, V.: Efficient parallel automata construction for hybrid resource-impelled data-matching. Future Generation Computer Systems (2013) ISSN 0167-739X","key":"41_CR16","DOI":"10.1016\/j.future.2013.09.008"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:37:44Z","timestamp":1676867864000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_41","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}