{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:31Z","timestamp":1725541591577},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_8","type":"book-chapter","created":{"date-parts":[[2009,11,27]],"date-time":"2009-11-27T22:33:01Z","timestamp":1259361181000},"page":"57-63","source":"Crossref","is-referenced-by-count":2,"title":["Hardware Based Data Inspection for USB Data Leakage Prevention"],"prefix":"10.1007","author":[{"given":"DongHo","family":"Kang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"BoHeung","family":"Jung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"KiYoung","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"Universal Serial Bus System Architecture","author":"D. Anderson","year":"2001","unstructured":"Anderson, D., Dzatko, D.: Universal Serial Bus System Architecture, 2nd edn. Addison-Wesley, Reading (2001)","edition":"2"},{"key":"8_CR2","unstructured":"Maier, G.M.: Hardware Pattern Matching for Network Traffic Analysis in Gigabit Environments. Diplomarbeit in Informatik, Technische Universit\u00e4t Munchen (May 2007)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Jacoby, G.A., Mosly, S.: Mobile Secuirty Using Separated Deep Packet Inspection. In: IEEE CCNC (2008)","DOI":"10.1109\/ccnc08.2007.113"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"song, H., Dharmapurikar, S., Turner, J., Lockwood, J.: Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing. In: SIGCOMM (August 2005)","DOI":"10.1145\/1080091.1080114"},{"key":"8_CR5","unstructured":"IDC, Information Protection and Control Survey: Data Loss Prevention and Encryption Trends, Doc #211109 (March 2008)"},{"key":"8_CR6","unstructured":"SOPHOS, White Paper Stopping data leakage: Exploiting your existing security investment (June 2008)"},{"key":"8_CR7","unstructured":"XILINX Inc., Virtext-5 FPGA User Guide (March 2008)"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T21:38:30Z","timestamp":1558388310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}