{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:44Z","timestamp":1763467904080,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642019562"},{"type":"electronic","value":"9783642019579"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01957-9_26","type":"book-chapter","created":{"date-parts":[[2009,5,15]],"date-time":"2009-05-15T15:24:25Z","timestamp":1242401065000},"page":"417-436","source":"Crossref","is-referenced-by-count":3,"title":["Fast Packet Classification Using Condition Factorization"],"prefix":"10.1007","author":[{"given":"Alok","family":"Tongaonkar","sequence":"first","affiliation":[]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[]},{"given":"Sreenaath","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"26_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A. Aho","year":"1975","unstructured":"Aho, A., Corasick, M.: Efficient string matching: An aid to bibliographic search. Communications of the ACM\u00a018(6), 333\u2013343 (1975)","journal-title":"Communications of the ACM"},{"key":"26_CR2","unstructured":"Bailey, M.L., Gopal, B., Pagels, M.A., Peterson, L.L., Sarkar, P.: Pathfinder: A pattern-based packet classifier. In: Operating Systems Design and Implementation, pp. 115\u2013123 (1994)"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Begel, A., McCanne, S., Graham, S.L.: BPF+: Exploiting global data-flow optimization in a generalized packet filter architecture. In: SIGCOMM, pp. 123\u2013134 (1999)","DOI":"10.1145\/316194.316214"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Chandra, S., McCann, P.: Packet types. In: Second Workshop on Compiler Support for Systems Software (WCSSS) (May 1999)","DOI":"10.1145\/347059.347563"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Engler, D.R., Kaashoek, M.F.: DPF: Fast, flexible message demultiplexing using dynamic code generation. In: SIGCOMM, pp. 53\u201359 (1996)","DOI":"10.1145\/248157.248162"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, P., McKeown, N.: Packet classification on multiple fields. In: ACM SIGCOMM (1999)","DOI":"10.1145\/316188.316217"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1017\/S0956796805005745","volume":"16","author":"P. Gustafsson","year":"2006","unstructured":"Gustafsson, P., Sagonas, K.: Efficient manipulation of binary data using pattern matching. J. Funct. Program.\u00a016(1), 35\u201374 (2006)","journal-title":"J. Funct. Program."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Hazem Hamed, E.A.-S., El-Atawy, A.: On dynamic optimization of packet matching in high-speed firewalls. IEEE Journal on Selected Areas in Communications\u00a024(10) (October 2006)","DOI":"10.1109\/JSAC.2006.877140"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-45248-5_10","volume-title":"Recent Advances in Intrusion Detection","author":"C. Kr\u00fcgel","year":"2003","unstructured":"Kr\u00fcgel, C., T\u00f3th, T.: Using decision trees to improve signature-based intrusion detection. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 173\u2013191. Springer, Heidelberg (2003)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Lakshman, T.V., Stiliadis, D.: High-speed policy-based packet forwarding using efficient multi-dimensional range matching. In: SIGCOMM, pp. 203\u2013214 (1998)","DOI":"10.1145\/285243.285283"},{"key":"26_CR11","unstructured":"McCanne, S., Jacobson, V.: The BSD packet filter: A new architecture for user-level packet capture. In: USENIX Winter, pp. 259\u2013270 (1993)"},{"key":"26_CR12","unstructured":"Paxson, V.: Bro: A system for detecting network intruders in real-time. In: USENIX Security (1998)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Ramesh, R., Ramakrishnan, I., Warren, D.: Automata-driven indexing of prolog clauses. In: Seventh Annual ACM Symposium on Principles of Programming Languages, San Francisco, pp. 281\u2013290 (1990); Revised version appears in Journal of Logic Programming (May 1995)","DOI":"10.1145\/96709.96738"},{"key":"26_CR14","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: 13th Systems Administration Conference, USENIX (1999)"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"1853","DOI":"10.1016\/B978-044450813-3\/50028-X","volume-title":"Handbook of Automated Reasoning, ch. 26","author":"R. Sekar","year":"2001","unstructured":"Sekar, R., Ramakrishnan, I., Voronkov, A.: Term indexing. In: Robinson, A., Voronkov, A. (eds.) Handbook of Automated Reasoning, ch. 26, vol.\u00a0II, pp. 1853\u20131964. Elsevier Science, Amsterdam (2001)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Sekar, R.C., Ramesh, R., Ramakrishnan, I.V.: Adaptive pattern matching. In: Automata, Languages and Programming, pp. 247\u2013260 (1992)","DOI":"10.1007\/3-540-55719-9_78"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Singh, S., Baboescu, F., Varghese, G., Wang, J.: Packet classification using multidimensional cutting. In: SIGCOMM (2003)","DOI":"10.1145\/863955.863980"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Enhancing byte-level network intrusion detection signatures with context. In: ACM CCS (2003)","DOI":"10.1145\/948109.948145"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Varghese, G., Suri, S., Waldvogel, M.: Fast and scalable layer four switching. In: Proceedings of ACM SIGCOMM 1998, pp. 191\u2013202 (September 1998)","DOI":"10.1145\/285243.285282"},{"key":"26_CR20","unstructured":"Woo, T.Y.C.: A modular approach to packet classification: Algorithms and results. In: INFOCOM (2000)"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01957-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T04:58:45Z","timestamp":1684990725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01957-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642019562","9783642019579"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01957-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}