{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:10Z","timestamp":1740122890709,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-019-07822-8","type":"journal-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T15:02:46Z","timestamp":1560178966000},"page":"16245-16263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["XWM: a high-speed matching algorithm for large-scale URL rules in wireless surveillance applications"],"prefix":"10.1007","volume":"79","author":[{"given":"Shuzhuang","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8157-5337","authenticated-orcid":false,"given":"Yanbin","family":"Sun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fanzhi","family":"Meng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yunsheng","family":"Fu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bowei","family":"Jia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhigang","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,10]]},"reference":[{"issue":"6","key":"7822_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho AV, Corasick MJ (1975) Efficient string matching: an aid to bibliographic search[J]. Commun ACM 18(6):333\u2013340","journal-title":"Commun ACM"},{"key":"7822_CR2","doi-asserted-by":"crossref","unstructured":"Allauzen C, Crochemore M, Raffinot M (1999) Factor oracle: A new structure for pattern matching[C]. International Conference on Current Trends in Theory and Practice of Computer Science. Springer Berlin Heidelberg 295\u2013310","DOI":"10.1007\/3-540-47849-3_18"},{"issue":"1","key":"7822_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"Du X, Xiao Y, Guizani M et al (2007) An effective key management scheme for heterogeneous sensor networks[J]. Ad Hoc Netw 5(1):24\u201334","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"7822_CR4","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TWC.2009.060598","volume":"8","author":"X Du","year":"2009","unstructured":"Du X, Guizani M, Xiao Y, Chen HH (2009) Transactions papers, \u201ca routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks,\u201d. IEEE Trans Wirel Commun 8(3):1223\u20131229","journal-title":"IEEE Trans Wirel Commun"},{"key":"7822_CR5","doi-asserted-by":"crossref","unstructured":"Kalnoor G, Agarkhed J (2016) Pattern matching intrusion detection technique for Wireless Sensor Networks[C]. Int Conf Adv Electr IEEE","DOI":"10.1109\/AEEICB.2016.7538389"},{"key":"7822_CR6","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.procs.2017.12.026","volume":"125","author":"G Kalnoor","year":"2018","unstructured":"Kalnoor G, Agarkhed J (2018) Detection of intruder using KMP pattern matching technique in wireless sensor networks[J]. Procedia Comput Sci 125:187\u2013193","journal-title":"Procedia Comput Sci"},{"key":"7822_CR7","first-page":"1159","volume":"37","author":"YB Liu","year":"2014","unstructured":"Liu YB, Shao Y, Wang Y, Liu QY, Guo L (2014) A multiple string matching algorithm for large-scale URL filtering. Chin J Comput 37:1159\u20131169","journal-title":"Chin J Comput"},{"key":"7822_CR8","doi-asserted-by":"crossref","unstructured":"Navarro G, Raffinot M (1998) A bit-parallel approach to suffix automata: fast extended string matching[C]. Combinatorial Pattern Matching. Springer Berlin\/Heidelberg 14\u201333","DOI":"10.1007\/BFb0030778"},{"key":"7822_CR9","doi-asserted-by":"crossref","unstructured":"Navarro G, Raffinot M (2002) Flexible pattern matching in strings. Practical on-line search algorithms or texts and biological sequences. Cambridge 1-2","DOI":"10.1017\/CBO9781316135228"},{"key":"7822_CR10","doi-asserted-by":"publisher","first-page":"74854","DOI":"10.1109\/ACCESS.2018.2881422","volume":"6","author":"J Qiu","year":"2018","unstructured":"Qiu J, Chai Y, Liu Y, Gu ZQ, Li S, Tian Z (2018) Automatic non-taxonomic relation extraction from big data in Smart City[J]. IEEE Access 6:74854\u201374864","journal-title":"IEEE Access"},{"key":"7822_CR11","first-page":"1.1","volume":"11","author":"L Salmela","year":"2007","unstructured":"Salmela L, Tarhio J, Kyt\u00f6joki J (2007) Multi-pattern string matching with q-grams[J]. J Exp Algorithmics (JEA) 11:1.1","journal-title":"J Exp Algorithmics (JEA)"},{"key":"7822_CR12","doi-asserted-by":"publisher","unstructured":"Tan Q, Gao Y, Shi J, Wang X, Fang B, Tian ZH (2018) Towards a comprehensive insight into the eclipse attacks of Tor hidden services. IEEE Internet Things J. \nhttps:\/\/doi.org\/10.1109\/JIOT.2018.2846624","DOI":"10.1109\/JIOT.2018.2846624"},{"key":"7822_CR13","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.future.2018.12.054","volume":"95","author":"Z Tian","year":"2019","unstructured":"Tian Z, Su S, Shi W, Yu X, Du X, Guizani M (2019) A data-driven model for future internet route decision modeling[J]. Futur Gener Comput Syst 95:212\u2013220","journal-title":"Futur Gener Comput Syst"},{"key":"7822_CR14","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Tian Z, Li M, Qiu M, Sun Y, Su S (2019) Block-DES: a secure digital evidence system using Blockchain. Inf Sci 491:151\u2013165. \nhttps:\/\/doi.org\/10.1016\/j.ins.2019.04.011","journal-title":"Inf Sci"},{"key":"7822_CR15","doi-asserted-by":"publisher","unstructured":"Tian Z, Shi W, Wang Y, Zhu C, Du X, Su S, Sun Y, Guizani N (2019) Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans Ind Inf. \nhttps:\/\/doi.org\/10.1109\/TII.2019.2907754","DOI":"10.1109\/TII.2019.2907754"},{"key":"7822_CR16","doi-asserted-by":"publisher","unstructured":"Tian Z, Gao X, Su S, Qiu J, Du X, Guizani M Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory. IEEE Trans Veh Technol. \nhttps:\/\/doi.org\/10.1109\/TVT.2019.2910217","DOI":"10.1109\/TVT.2019.2910217"},{"issue":"14","key":"7822_CR17","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1002\/dac.2911","volume":"29","author":"Y Wang","year":"2016","unstructured":"Wang Y, Sun M, Wang K et al (2016) Quality of experience estimation with layered mapping for hypertext transfer protocol video streaming over wireless networks[J]. Int J Commun Syst 29(14):2084\u20132099","journal-title":"Int J Commun Syst"},{"key":"7822_CR18","unstructured":"Wu S, Manber U (1994) A fast algorithm for multi-pattern searching [J]"},{"key":"7822_CR19","unstructured":"Xiong G, He HM, Yu J et al (2015) HybridFA: A memory reduction technique for the AC automata based on statistics[J]. J Commun"},{"key":"7822_CR20","unstructured":"Xu DL (2015) Research on high-performance online pattern matching algorithm[D]. Harbin Institute of Technology"},{"key":"7822_CR21","first-page":"1","volume":"2","author":"X Yu","year":"2018","unstructured":"Yu X, Tian Z, Qiu J, Jiang F (2018) A data leakage prevention method based on the reduction of confidential and context terms for smart Mobile devices[J]. Wirel Commun Mob Comput 2:1\u201311","journal-title":"Wirel Commun Mob Comput"},{"key":"7822_CR22","doi-asserted-by":"crossref","unstructured":"Yuan Z, Yang B, Ren X et al (2013) TFD: A multi-pattern matching algorithm for large-scale URL filtering[C]. Computing, Networking and Communications (ICNC), 2013 International Conference on IEEE 359\u2013363","DOI":"10.1109\/ICCNC.2013.6504109"},{"key":"7822_CR23","unstructured":"Zhang P, Liu YB, Yu J et al (2015) HashTrie: a space-efficient multiple string matching algorithm[J]. J Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07822-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-07822-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07822-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:18:28Z","timestamp":1593623908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-07822-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,10]]},"references-count":23,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7822"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-07822-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,6,10]]},"assertion":[{"value":"30 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}