{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:08:37Z","timestamp":1743098917329,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642036439"},{"type":"electronic","value":"9783642036446"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03644-6_15","type":"book-chapter","created":{"date-parts":[[2009,8,21]],"date-time":"2009-08-21T09:16:51Z","timestamp":1250846211000},"page":"191-204","source":"Crossref","is-referenced-by-count":4,"title":["A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU"],"prefix":"10.1007","author":[{"given":"Chengkun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]},{"given":"En","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Antonatos, S., Anagnostakis, K.G., Markatos, E.P.: Generating realistic workloads for network intrusion detection systems. In: ACM SIGSOFT Software Engineering Notes, vol.\u00a029, pp. 207\u2013215 (2004)","DOI":"10.1145\/974043.974078"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Tuck, N., Sherwood, T., Calder, B., Varghese, G.: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Proc. of INFOCOM, vol.\u00a04, pp. 2628\u20132639 (2004)","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/FCCM.2004.50","volume-title":"Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines","author":"C.R. Clark","year":"2004","unstructured":"Clark, C.R., Schimmel, D.E.: Scalable Pattern Matching for High Speed Networks. In: Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pp. 249\u2013257. IEEE Computer Society, Washington (2004)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Tan, L., Sherwood, T.: A High Throughput String Matching Architecture for Intrusion Detection and Prevention. In: Proceedings of the 32nd annual international symposium on Computer Architecture, vol.\u00a04, pp. 112\u2013122 (2005)","DOI":"10.1145\/1080695.1069981"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1109\/JSAC.2006.877131","volume":"24","author":"S. Dharmapurikar","year":"2006","unstructured":"Dharmapurikar, S., Lockwood, J.W.: Fast and scalable pattern matching for network intrusion detection systems. IEEE Journal on Selected Areas in Communications\u00a024, 1781\u20131791 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"15_CR6","unstructured":"Yu, F., Katz, R.H., Lakshman, T.V.: Gigabit rate packet pattern-matching using TCAM. In: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004, pp. 174\u2013183 (2004)"},{"key":"15_CR7","first-page":"187","volume-title":"High speed pattern matching for network IDS\/IPS","author":"M. Alicherry","year":"2006","unstructured":"Alicherry, M., Muthuprasanna, M., Kumar, V.: High speed pattern matching for network IDS\/IPS, pp. 187\u2013196. IEEE Computer Society, Los Alamitos (2006)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Lei, S., Yue, Z., Jianming, Y., Bo, X., Bin, L., Jun, L.: On the Extreme Parallelism Inside Next-Generation Network Processors. In: Proceedings of INFOCOM, pp. 1379\u20131387 (2007)","DOI":"10.1109\/INFCOM.2007.163"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Ni, J., Lin, C., Chen, Z., Ungsunan, P.: A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor. In: International Conference on Parallel Processing (2007)","DOI":"10.1109\/ICPP.2007.7"},{"key":"15_CR10","unstructured":"Nvidia G80 Specs, http:\/\/www.nvidian.com\/page\/8800_features.html"},{"key":"15_CR11","unstructured":"Nvidia CUDA Programming Guide 2.1., http:\/\/developer.download.nvidia.com\/compute\/cuda\/2_1\/NVIDIA_CUDA_Programming_Guide_2.1.pdf"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.diin.2007.06.014","volume":"4","author":"L. Marziale","year":"2007","unstructured":"Marziale, L., Richard, G.G., Roussev, V.: Massive threading: Using GPUs to increase the performance of digital forensics tools. Digital Investigation\u00a04, 73\u201381 (2007)","journal-title":"Digital Investigation"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 116\u2013134. Springer, Heidelberg (2008)"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A.V. Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM\u00a018, 333\u2013340 (1975)","journal-title":"Communications of the ACM"},{"key":"15_CR15","unstructured":"Goyal, N., Ormont, J., Smith, R., Sankaralingam, K., Estan, C.: Signature Matching in Network Processing using SIMD\/GPU Architectures. UW CS technical report 1628 (January 2008)"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/1402958.1402983","volume-title":"Proceedings of the ACM SIGCOMM 2008 conference on Data communication","author":"R. Smith","year":"2008","unstructured":"Smith, R., Estan, C., Jha, S., Kong, S.: Deflating the big bang: fast and scalable deep packet inspection with extended finite automata. In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 207\u2013218. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03644-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T20:25:27Z","timestamp":1739305527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03644-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642036439","9783642036446"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03644-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}