{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:56:18Z","timestamp":1742403378325,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229896"},{"type":"electronic","value":"9783540301172"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30117-2_50","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T09:01:02Z","timestamp":1284800462000},"page":"484-493","source":"Crossref","is-referenced-by-count":32,"title":["Over 10Gbps String Matching Mechanism for Multi-stream Packet Scanning Systems"],"prefix":"10.1007","author":[{"given":"Yutaka","family":"Sugawara","sequence":"first","affiliation":[]},{"given":"Mary","family":"Inaba","sequence":"additional","affiliation":[]},{"given":"Kei","family":"Hiraki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Coit, C.J., Staniford, S., McAlerney, J.: Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort. In: DISCEXII, DARPA Information Survivability conference and Exposition (2001)","DOI":"10.1109\/DISCEX.2001.932231"},{"key":"50_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/3-540-46117-5_48","volume-title":"Field-Programmable Logic and Applications. Reconfigurable Computing Is Going Mainstream","author":"Y.H. Cho","year":"2002","unstructured":"Cho, Y.H., Navab, S., Mangione-Smith, W.H.: Specialized Hardware for Deep Network Packet Filtering. In: Glesner, M., Zipf, P., Renovell, M. (eds.) FPL 2002. LNCS, vol.\u00a02438, p. 452. Springer, Heidelberg (2002)"},{"key":"50_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45234-8_85","volume-title":"Field Programmable Logic and Application","author":"I. Sourdis","year":"2003","unstructured":"Sourdis, I., Pnevmatikatos, D.: Fast, Large-Scale String Match for a 10Gbps FPGAbased Network Intrusion Detection System. In: Y. K. Cheung, P., Constantinides, G.A. (eds.) FPL 2003. LNCS, vol.\u00a02778, Springer, Heidelberg (2003)"},{"key":"50_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/3-540-46117-5_43","volume-title":"Field-Programmable Logic and Applications. Reconfigurable Computing Is Going Mainstream","author":"M. Gokhale","year":"2002","unstructured":"Gokhale, M., Dubois, D., Dubois, A., Boorman, M., Poole, S., Hogsett, V.: Granidt: Towards Gigabit Rate Network Intrusion Detection Technology. In: Glesner, M., Zipf, P., Renovell, M. (eds.) FPL 2002. LNCS, vol.\u00a02438, p. 404. Springer, Heidelberg (2002)"},{"key":"50_CR5","unstructured":"Sidhu, R., Prasanna, V.K.: Fast regular expression matching using fpgas. In: Proc. of 9th IEEE Symp. on Field-Programmable Custom Computing Machines, FCCM 2001 (2001)"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Hutchings, B.L., Franklin, R., Carver, D.: Assisting network intrusion detection with reconfigurable hardware. In: Proc. of 10 th Annual IEEE Symp. on Field- Programmable Custom Computing Machines (FCCM 2002), pp. 111\u2013120 (2002)","DOI":"10.1109\/FPGA.2002.1106666"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Clark, C., Schimmel, D.: Scalable pattern matching for high speed networks. In: Proc. of 12th IEEE Symp. on Field-Programmable Custom Computing Machines, FCCM 2004 (2004)","DOI":"10.1109\/FCCM.2004.50"},{"key":"50_CR8","doi-asserted-by":"crossref","unstructured":"Moscola, J., Lockwood, J., Loui, R.P., Pachos, M.: Implementation of a contentscanning module for an internet firewall. In: Proc. of 11th Annual IEEE Symp. on Field-Programmable Custom Computing Machines (FCCM 2003), pp. 31\u201338 (2003)","DOI":"10.1109\/FPGA.2003.1227239"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel bloom filters. In: Proc. of 11th IEEE Symp. on High Performance Interconnects (HotI 2003), pp. 44\u201351 (2003)","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Baker, Z.K., Prasanna, V.K.: Time and Area Efficient Pattern Matching on FPGAs. In: Proc. of the 2004 ACM\/SIGDA 12th Intl. Symp. on Field programmable gate arrays(FPGA 2004), pp. 223\u2013232 (2004)","DOI":"10.1145\/968280.968312"},{"key":"50_CR11","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"V. Aho","year":"1975","unstructured":"Aho, V., Corasick, M.J.: Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM\u00a018, 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"50_CR12","unstructured":"Handley, M., Paxson, V.: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. In: Proc. of 10th USENIX Security Symposium (2001)"},{"key":"50_CR13","unstructured":"Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of Lisa 1999: 13th Administration Conference (1999)"},{"key":"50_CR14","unstructured":"Sugawara, Y.: Correctness Proof of the SBT method. Technical report, Dept. of Computer, Science, Univ. of Tokyo (2004)"}],"container-title":["Lecture Notes in Computer Science","Field Programmable Logic and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30117-2_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:31:15Z","timestamp":1740522675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30117-2_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229896","9783540301172"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30117-2_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}