{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:43:54Z","timestamp":1742989434573,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319728162"},{"type":"electronic","value":"9783319728179"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_11","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"163-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CRBP-OpType: A Constrained Approximate Search Algorithm for Detecting Similar Attack Patterns"],"prefix":"10.1007","author":[{"given":"Ambika Shrestha","family":"Chitrakar","sequence":"first","affiliation":[]},{"given":"Slobodan","family":"Petrovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"11_CR1","unstructured":"Norton, M.: Optimizing Pattern Matching for Intrusion Detection. \nhttps:\/\/snort.org\/documents\n\n. Accessed 2017"},{"issue":"6","key":"11_CR2","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18(6), 333\u2013340 (1975)","journal-title":"Commun. ACM"},{"issue":"10","key":"11_CR3","doi-asserted-by":"crossref","first-page":"1906","DOI":"10.1109\/TC.2012.254","volume":"62","author":"CH Lin","year":"2013","unstructured":"Lin, C.H., Liu, C.H., Chien, L.S., Chang, S.C.: Accelerating pattern matching using a novel parallel algorithm on GPUs. IEEE Trans. Comput. 62(10), 1906\u20131916 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Yoon, J., Choi, K.I., Kim, H.: A memory accessing method for the parallel Aho-Corasick algorithm on GPU. In: 2016 International Conference on Information Science and Security (ICISS), pp. 1\u20133 (2016)","DOI":"10.1109\/ICISSEC.2016.7885837"},{"key":"11_CR5","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/PL00009253","volume":"23","author":"R Baeza-yates","year":"1999","unstructured":"Baeza-yates, R., Navarro, G.: Faster approximate string matching. Algorithmica 23, 127\u2013158 (1999)","journal-title":"Algorithmica"},{"key":"11_CR6","unstructured":"Chitrakar, A.S., Petrovic, S.: Approximate search with constraints on indels with application in SPAM filtering. In: Norsk Informasjonssikkerhetskonferanse (NISK) (2015)"},{"key":"11_CR7","unstructured":"Chitrakar, A.S., Petrovic, S.: Constrained row-based bit-parallel search in intrusion detection. In: Norsk Informasjonssikkerhetskonferanse (NISK) (2016)"},{"key":"11_CR8","unstructured":"Faro, S., Lecroq, T.: Twenty years of bit-parallelism in string matching. In: Festschrift for Bo\u0159ivoj Melichar, pp. 72\u2013101 (2012)"},{"issue":"8","key":"11_CR9","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Sov. Phys.-Dokl. 10(8), 707\u2013710 (1966). Translated from Dokl. Akad. Nauk SSSR 163(4), 845\u2013848 (1965)","journal-title":"Sov. Phys.-Dokl."},{"issue":"1","key":"11_CR10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Comput. Surv. 33(1), 31\u201388 (2001)","journal-title":"ACM Comput. Surv."},{"key":"11_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316135228","volume-title":"Flexible Pattern Matching in Strings: Practical On-line Search Algorithms for Texts and Biological Sequences","author":"G Navarro","year":"2002","unstructured":"Navarro, G., Raffinot, M.: Flexible Pattern Matching in Strings: Practical On-line Search Algorithms for Texts and Biological Sequences. Cambridge University Press, New York (2002)"},{"key":"11_CR12","unstructured":"Martin., R.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, pp. 229\u2013238 (1999)"},{"key":"11_CR13","volume-title":"Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison","author":"D Sankoff","year":"1983","unstructured":"Sankoff, D., Kruskal, J.B.: Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison. Addison Wesley, Reading (1983)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0304-3975(92)90143-4","volume":"92","author":"E Ukkonen","year":"1992","unstructured":"Ukkonen, E.: Approximate string-matching with Q-grams and maximal matches. Theor. Comput. Sci. 92(1), 191\u2013211 (1992)","journal-title":"Theor. Comput. Sci."},{"issue":"10","key":"11_CR15","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/135239.135244","volume":"35","author":"S Wu","year":"1992","unstructured":"Wu, S., Manber, U.: Fast text searching allowing errors. Commun. ACM 35(10), 83\u201391 (1992)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,31]],"date-time":"2018-01-31T08:53:54Z","timestamp":1517388834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}