{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:22:49Z","timestamp":1761740569699,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T00:00:00Z","timestamp":1541808000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282","61772454","6171101570"],"award-info":[{"award-number":["61772282","61772454","6171101570"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11227-018-2685-y","type":"journal-article","created":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T01:14:17Z","timestamp":1541812457000},"page":"4295-4308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Improved deep packet inspection in data stream detection"],"prefix":"10.1007","volume":"75","author":[{"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"given":"Hongyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Ruxia","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6516-6787","authenticated-orcid":false,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,10]]},"reference":[{"issue":"16","key":"2685_CR1","doi-asserted-by":"publisher","first-page":"16911","DOI":"10.1007\/s11042-016-3638-1","volume":"76","author":"C Yin","year":"2017","unstructured":"Yin C, Zhang S (2017) Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimed Tools Appl 76(16):16911\u201316927","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"2685_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TCE.2014.6780921","volume":"60","author":"J Wang","year":"2014","unstructured":"Wang J, Zhang Z, Li B, Lee S, Sherratt RS (2014) An enhanced fall detection system for elderly person monitoring using consumer home networks. IEEE Trans Consum Electron 60(1):23\u201329","journal-title":"IEEE Trans Consum Electron"},{"key":"2685_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2017.2773646","author":"C Yin","year":"2017","unstructured":"Yin C, Xi J, Sun R (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things. IEEE Trans Ind Inf. \n                    https:\/\/doi.org\/10.1109\/tii.2017.2773646","journal-title":"IEEE Trans Ind Inf"},{"issue":"9","key":"2685_CR4","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2016) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parallel Distrib Syst 27(9):2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"2685_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13673-016-0076-z","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan N, Ji S-Y, Chaudhary A, Concolato C, Yu B, Jeong DH (2016) A survey of cloud-based network intrusion detection analysis. Human-Cent Comput Inf Sci 6(1):19","journal-title":"Human-Cent Comput Inf Sci"},{"issue":"3","key":"2685_CR6","first-page":"476","volume":"13","author":"SB Rathod","year":"2017","unstructured":"Rathod SB, Reddy VK (2017) Ndynamic framework for secure vm migration over cloud computing. J Inf Process Syst 13(3):476\u2013490","journal-title":"J Inf Process Syst"},{"issue":"1","key":"2685_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0065-2","volume":"6","author":"C Iuga","year":"2016","unstructured":"Iuga C, Nurse JRC, Erola A (2016) Baiting the hook: factors impacting susceptibility to phishing attacks. Human-Cent Comput Inf Sci 6(1):1\u201320","journal-title":"Human-Cent Comput Inf Sci"},{"issue":"4","key":"2685_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/2829988.2787502","volume":"45","author":"J Sherry","year":"2015","unstructured":"Sherry J, Lan C, Popa RA, Ratnasamy S (2015) Blindbox: deep packet inspection over encrypted traffic. ACM SIGCOMM Comput Commun Rev 45(4):213\u2013226","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"1","key":"2685_CR9","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MM.2004.1268997","volume":"24","author":"S Dharmapurikar","year":"2004","unstructured":"Dharmapurikar S, Krishnamurthy P, Sproull TS, Lockwood JW (2004) Deep packet inspection using parallel bloom filters. IEEE Micro 24(1):52\u201361","journal-title":"IEEE Micro"},{"issue":"7","key":"2685_CR10","doi-asserted-by":"publisher","first-page":"2670","DOI":"10.1007\/s11227-015-1573-y","volume":"72","author":"C Yin","year":"2016","unstructured":"Yin C, Feng L, Ma L (2016) An improved Hoeffding-ID data-stream classification algorithm. J Supercomput 72(7):2670\u20132681","journal-title":"J Supercomput"},{"issue":"7","key":"2685_CR11","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu B, Sun X, Sheng VS (2017) Structural minimax probability machine. IEEE Trans Neural Netw Learn Syst 28(7):1646\u20131656","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2685_CR12","doi-asserted-by":"publisher","first-page":"4185","DOI":"10.1007\/s00500-017-2708-2","volume":"22","author":"C Yin","year":"2017","unstructured":"Yin C, Xia L, Zhang S, Sun R, Wang J (2017) Improved clustering algorithm based on high-speed network data stream. Soft Comput 22:4185\u20134195","journal-title":"Soft Comput"},{"issue":"12","key":"2685_CR13","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s00607-015-0453-x","volume":"97","author":"T Ma","year":"2015","unstructured":"Ma T, Zhang Y, Cao J, Shen J, Tang M, Tian Y, Al-Rodhaan M (2015) KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12):1165\u20131184","journal-title":"Computing"},{"issue":"7","key":"2685_CR14","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"5","key":"2685_CR15","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu B, Sheng VS (2017) A robust regularization path algorithm for v-support vector classification. IEEE Trans Neural Netw Learn Syst 28(5):1241\u20131248","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"12","key":"2685_CR16","doi-asserted-by":"publisher","first-page":"6469","DOI":"10.1109\/TGRS.2015.2441954","volume":"53","author":"J Ma","year":"2015","unstructured":"Ma J, Zhou H, Zhao J, Gao Y, Jiang J, Tian J (2015) Robust feature matching for remote sensing image registration via locally linear transforming. IEEE Trans Geosci Remote Sens 53(12):6469\u20136481","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"1","key":"2685_CR17","first-page":"121","volume":"55","author":"D Zeng","year":"2018","unstructured":"Zeng D, Dai Y, Li F, Sherratt RS, Wang J (2018) Adversarial learning for distant supervised relation extraction. Comput Mater Contin 55(1):121\u2013136","journal-title":"Comput Mater Contin"},{"issue":"2","key":"2685_CR18","first-page":"243","volume":"55","author":"Y Tu","year":"2018","unstructured":"Tu Y, Lin Y, Wang J, Kim JU (2018) Semi-supervised learning with generative adversarial networks on digital signal modulation classification. Comput Mater Contin 55(2):243\u2013254","journal-title":"Comput Mater Contin"},{"issue":"3","key":"2685_CR19","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1109\/TNET.2011.2181411","volume":"20","author":"M Bando","year":"2012","unstructured":"Bando M, Artan NS, Chao HJ (2012) Scalable lookahead regular expression detection system for deep packet inspection. IEEE\/ACM Trans Netw 20(3):699\u2013714","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"8","key":"2685_CR20","first-page":"220","volume":"4","author":"R Vuppala","year":"2015","unstructured":"Vuppala R, Farik M (2015) Intrusion detection amp prevention systems-sourcefire snort. Int J Sci Technol Res 4(8):220\u2013223","journal-title":"Int J Sci Technol Res"},{"issue":"23","key":"2685_CR21","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23):2435\u20132463","journal-title":"Comput Netw"},{"issue":"2","key":"2685_CR22","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/0304-3975(93)90287-4","volume":"120","author":"A Br\u00fcggemann-Klein","year":"1993","unstructured":"Br\u00fcggemann-Klein A (1993) Regular expressions into finite automata. Theoret Comput Sci 120(2):197\u2013213","journal-title":"Theoret Comput Sci"},{"issue":"1","key":"2685_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1952998.1953002","volume":"8","author":"L Vespa","year":"2011","unstructured":"Vespa L, Weng N (2011) Deterministic finite automata characterization and optimization for scalable pattern matching. ACM Trans Arch Code Optim 8(1):1\u201331","journal-title":"ACM Trans Arch Code Optim"},{"issue":"4","key":"2685_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1575779.1575783","volume":"2","author":"CTD Lo","year":"2009","unstructured":"Lo CTD, Tai YG (2009) Space optimization on counters for FPGA-based perl compatible regular expressions. ACM Trans Reconfig Technol Syst 2(4):1\u201318","journal-title":"ACM Trans Reconfig Technol Syst"},{"key":"2685_CR25","doi-asserted-by":"crossref","unstructured":"Yu F, Chen Z, Diao Y, Lakshman T, Katz RH (2006) Fast and memory-efficient regular expression matching for deep packet inspection. In: ACM\/IEEE Symposium on Architecture for Networking and Communications Systems, 2006. ANCS 2006, pp 93\u2013102","DOI":"10.1145\/1185347.1185360"},{"key":"2685_CR26","doi-asserted-by":"crossref","unstructured":"Becchi M, Crowley P (2008) Extending finite automata to efficiently match Perl-compatible regular expressions. In: ACM conference on emerging network experiment and technology, pp 1\u201312","DOI":"10.1145\/1544012.1544037"},{"key":"2685_CR27","doi-asserted-by":"crossref","unstructured":"Becchi M, Crowley P (2007) A hybrid finite automaton for practical deep packet inspection. In: Proceedings of the 2007 ACM CoNEXT Conference, pp 1\u201312","DOI":"10.1145\/1364654.1364656"},{"issue":"1","key":"2685_CR28","doi-asserted-by":"publisher","first-page":"95","DOI":"10.12785\/amis\/080111","volume":"8","author":"A Kumar","year":"2014","unstructured":"Kumar A, Verma AK (2014) A novel algorithm for the conversion of parallel regular expressions to non-deterministic finite automata. Appl Math Inf Sci 8(1):95\u2013105","journal-title":"Appl Math Inf Sci"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2685-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2685-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2685-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,9]],"date-time":"2019-11-09T19:10:50Z","timestamp":1573326650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2685-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,10]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["2685"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2685-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,11,10]]},"assertion":[{"value":"10 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}