{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T16:15:04Z","timestamp":1769271304359,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642108464","type":"print"},{"value":"9783642108471","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_37","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"298-305","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU"],"prefix":"10.1007","author":[{"given":"Chengkun","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianping","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"En","family":"Zhu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"37_CR1","unstructured":"Snort: the de-facto network intrusion detection system, \n                  \n                    http:\/\/www.snort.org"},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/974043.974078","volume":"29","author":"S. Antonatos","year":"2004","unstructured":"Antonatos, S., Anagnostakis, K.G., Markatos, E.P.: Generating realistic workloads for network intrusion detection systems. ACM SIGSOFT Software Engineering Notes\u00a029, 207\u2013215 (2004)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Van Lunteren, J.: High-Performance Pattern-Matching for Intrusion Detection. In: Proceedings of IEEE INFOCOM, pp. 1\u201313 (2006)","DOI":"10.1109\/INFOCOM.2006.204"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Zheng, K., Lu, H.: Scalable Pattern-Matching via Dynamic Differentiated Distributed Detection (D4). In: Proceedings of IEEE GLOBECOM (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.390"},{"key":"37_CR5","first-page":"673","volume-title":"INFOCOM","author":"T. Song","year":"2008","unstructured":"Song, T., Zhang, W., Wang, D., Xue, Y.: A memory efficient multiple pattern matching architecture for network security. In: INFOCOM, pp. 673\u2013681. Institute of Electrical and Electronics Engineers Inc., Piscataway (2008)"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Tan, L., Sherwood, T.: A High Throughput String Matching Architecture for Intrusion Detection and Prevention. In: Proceedings of the 32nd annual international symposium on Computer Architecture, vol.\u00a04, pp. 112\u2013122 (2005)","DOI":"10.1145\/1080695.1069981"},{"key":"37_CR7","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/968280.968312","volume-title":"Proceedings of the 2004 ACM\/SIGDA 12th international symposium on Field programmable gate arrays","author":"Z.K. Baker","year":"2004","unstructured":"Baker, Z.K., Prasanna, V.K.: Time and area efficient pattern matching on FPGAs. In: Proceedings of the 2004 ACM\/SIGDA 12th international symposium on Field programmable gate arrays, pp. 223\u2013232. ACM, New York (2004)"},{"key":"37_CR8","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1109\/JSAC.2006.877131","volume":"24","author":"S. Dharmapurikar","year":"2006","unstructured":"Dharmapurikar, S., Lockwood, J.W.: Fast and scalable pattern matching for network intrusion detection systems. IEEE Journal on Selected Areas in Communications\u00a024, 1781\u20131791 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"37_CR9","unstructured":"Yu, F., Katz, R.H., Lakshman, T.V.: Gigabit rate packet pattern-matching using TCAM. In: Proceedings of the 12th IEEE International Conference on Network Protocols, pp. 174\u2013183 (2004)"},{"key":"37_CR10","unstructured":"Nvidia G80 Specs, \n                  \n                    http:\/\/www.nvidian.com\/page\/8800_features.html"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.diin.2007.06.014","volume":"4","author":"L. Marziale","year":"2007","unstructured":"Marziale, L., Richard, G.G., Roussev, V.: Massive threading: Using GPUs to increase the performance of digital forensics tools. Digital Investigation\u00a04, 73\u201381 (2007)","journal-title":"Digital Investigation"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High performance network intrusion detection using graphics processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 116\u2013134. Springer, Heidelberg (2008)"},{"key":"37_CR13","unstructured":"Goyal, N., Ormont, J., Smith, R., Sankaralingam, K., Estan, C.: Signature Matching in Network Processing using SIMD\/GPU Architectures. UW CS technical report 1628 (January 2008)"},{"key":"37_CR14","unstructured":"Nvidia CUDA Programming Guide 2.1, \n                  \n                    http:\/\/developer.download.nvidia.com\/compute\/cuda\/2_1\/NVIDIA_CUDA_Programming_Guide_2.1.pdf"},{"key":"37_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"A.V. Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM\u00a018, 333\u2013340 (1975)","journal-title":"Communications of the ACM"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:42:45Z","timestamp":1619768565000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}