{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:27:58Z","timestamp":1743096478292,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214837"},{"type":"electronic","value":"9783642214844"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21484-4_2","type":"book-chapter","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T06:43:37Z","timestamp":1308638617000},"page":"13-25","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Distributed Signature Analysis"],"prefix":"10.1007","author":[{"given":"Michael","family":"Vogel","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Schmerl","sequence":"additional","affiliation":[]},{"given":"Hartmut","family":"K\u00f6nig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Cisco Systems Inc.: NetFlow Services and Applications. White Paper (2002), \n                    \n                      http:\/\/www.cisco.com\/warp\/public\/cc\/pd\/iosw\/ioft\/neflct\/tech\/napps_wp.htm"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-30108-0_25","volume-title":"Computer Security \u2013 ESORICS 2004","author":"J. McHugh","year":"2004","unstructured":"McHugh, J.: Set, Bags and Rock and Roll \u2013 Analyzing Large Datasets of Network Data. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 407\u2013422. Springer, Heidelberg (2004)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Sommer, R., Feldmann, A.: NetFlow: Information Loss or Win? In: 2nd ACM SIGCOMM and USENIX Internet Measurement Workshop (IMW 2002), Marseille, France (2002)","DOI":"10.1145\/637201.637226"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-30144-8_14","volume-title":"Information Security","author":"M. Meier","year":"2004","unstructured":"Meier, M.: A Model for the Semantics of Attack Signatures in Misuse Detection Systems. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 158\u2013169. Springer, Heidelberg (2004)"},{"key":"2_CR5","first-page":"217","volume-title":"18th IFIP International Information Security Conference (SEC 2003)","author":"K.G. Anagnostakis","year":"2003","unstructured":"Anagnostakis, K.G., Markatos, E.P., Antonatos, S., Polychronakis, M.: E2xB: A Domain Specific String Matching Algorithm for Intrusion Detection. In: 18th IFIP International Information Security Conference (SEC 2003), pp. 217\u2013228. Kluwer Academic Publishing, Dordrecht (2003)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-15512-3_4","volume-title":"Recent Advances in Intrusion Detection","author":"L. Yang","year":"2010","unstructured":"Yang, L., Karim, R., Ganapathy, V., Smith, R.: Improving NFA-based Signature Matching Using Ordered Binary Decision Diagrams. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, pp. 58\u201378. Springer, Heidelberg (2010)"},{"key":"2_CR7","unstructured":"Shemitz, J.: Using RDTSC for Pentium Benchmarking. Visual Developer Magazine, Coriolis Group, Scottsdale, AZ, USA (June\/July 1996), \n                    \n                      http:\/\/www.midnightbeach.com\/jon\/pubs\/rdtsc.htm"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-87403-4_7","volume-title":"Recent Advances in Intrusion Detection","author":"G. Vasiliadis","year":"2008","unstructured":"Vasiliadis, G., Antonatos, S., Polychronakis, M., Markatos, E.P., Ioannidis, S.: Gnort: High Performance Network Intrusion Detection Using Graphics Processors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 116\u2013134. Springer, Heidelberg (2008)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-45861-1_10","volume-title":"Information Security and Cryptology - ICISC 2001","author":"C. Kr\u00fcgel","year":"2002","unstructured":"Kr\u00fcgel, C., T\u00f3th, T., Kerer, C.: Decentralized Event Correlation for Intrusion Detection. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 114\u2013131. Springer, Heidelberg (2002)"},{"key":"2_CR10","volume-title":"IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation","author":"M. Colajanni","year":"2006","unstructured":"Colajanni, M., Marchetti, M.: A Parallel Architecture for Stateful Intrusion Detection in High Trac Networks. In: IEEE\/IST Workshop on Monitoring, Attack Detection and Mitigation. IEEE Press, Los Alamitos (2006)"},{"key":"2_CR11","first-page":"315","volume-title":"2nd Conference on Computing Frontiers (CCF 2005)","author":"L. Schaelicke","year":"2005","unstructured":"Schaelicke, L., Wheeler, K., Freeland, C.: SPANIDS: A Scalable Network Intrusion Detection Loadbalancer. In: 2nd Conference on Computing Frontiers (CCF 2005), pp. 315\u2013322. ACM, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Managing the Dynamics of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21484-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T03:15:40Z","timestamp":1553829340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21484-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214837","9783642214844"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21484-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}