{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T02:14:55Z","timestamp":1769393695866,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s11633-012-0660-2","type":"journal-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T08:18:57Z","timestamp":1344413937000},"page":"395-402","source":"Crossref","is-referenced-by-count":10,"title":["Functional verification of signature detection architectures for high speed network applications"],"prefix":"10.1007","volume":"9","author":[{"given":"M.","family":"Arun","sequence":"first","affiliation":[]},{"given":"A.","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,9]]},"reference":[{"issue":"4","key":"660_CR1","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/s11633-011-0606-0","volume":"8","author":"D. J. Day","year":"2011","unstructured":"D. J. Day, Z. X. Zhao. Protecting against address space layout randomization (ASLR) compromises and return-to-Libc attacks using network intrusion detection systems. International Journal of Automation and Computing, vol. 8, no. 4, pp. 472\u2013483, 2011.","journal-title":"International Journal of Automation and Computing"},{"issue":"4","key":"660_CR2","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/s11633-009-0406-y","volume":"6","author":"S. S. S. Sindhu","year":"2009","unstructured":"S. S. S. Sindhu, S. Geetha, M. Marikannan, A. Kannan. A neuro-genetic based short-term forecasting framework for network intrusion prediction system. International Journal of Automation and Computing, vol. 6, no. 4, pp. 406\u2013414, 2009.","journal-title":"International Journal of Automation and Computing"},{"key":"660_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/DATE.2006.244064","volume-title":"Proceedings of Design, Automation and Test in Europe","author":"H. Shrikumar","year":"2006","unstructured":"H. Shrikumar. 40Gbps de-layered silicon protocol engine for TCP record. In Proceedings of Design, Automation and Test in Europe, IEEE, Munich, Germany, pp. 1\u20136, 2006."},{"key":"660_CR4","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/FPGA.1993.279466","volume-title":"Proceedings of IEEE Symposium on FPGAs for Custom Computing Machines","author":"D. V. Pryor","year":"1993","unstructured":"D. V. Pryor, M. R. Thistle, N. Shirazi. Text searching on splash 2. In Proceedings of IEEE Symposium on FPGAs for Custom Computing Machines, IEEE, Napa, USA, pp. 172\u2013177, 1993."},{"key":"660_CR5","first-page":"227","volume-title":"Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines","author":"R. Sidhu","year":"2001","unstructured":"R. Sidhu, V. K. Prasanna. Fast regular expression matching using FPGAs. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, Rohnert Park, USA, pp. 227\u2013238, 2001."},{"key":"660_CR6","first-page":"111","volume-title":"Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines","author":"R. Franklin","year":"2002","unstructured":"R. Franklin, D. Carver, B. L. Hutchings. Assisting network intrusion detection with reconfigurable hardware. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, Napa, USA, pp. 111\u2013120, 2002."},{"key":"660_CR7","doi-asserted-by":"crossref","unstructured":"J. Moscola, J. Lockwood, R. P. Loui, M. Pachos. Implementation of a content-scanning module for an internet firewall. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, pp. 31\u201338, 2003.","DOI":"10.1109\/FPGA.2003.1227239"},{"key":"660_CR8","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1007\/978-3-540-45234-8_94","volume":"2778","author":"C. R. Clark","year":"2003","unstructured":"C. R. Clark, D. E. Schimmel. Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns. Lecture Notes in Computer Science, Springer, vol. 2778, pp. 956\u2013959, 2003.","journal-title":"Lecture Notes in Computer Science, Springer"},{"key":"660_CR9","doi-asserted-by":"crossref","unstructured":"C. R. Clark, D. E. Schimmel. Scalable parallel patternmatching for high-speed networks. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, pp. 249\u2013257, 2004.","DOI":"10.1109\/FCCM.2004.50"},{"key":"660_CR10","doi-asserted-by":"crossref","unstructured":"Y. H. Cho, W. H. Mangione-Smith. Deep packet filter with dedicated logic and read only memories. In Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE, pp. 125\u2013134, 2004.","DOI":"10.1109\/FCCM.2004.25"},{"key":"660_CR11","first-page":"223","volume-title":"Proceedings of ACM International Symposium on Field-Programmable Gate Arrays","author":"Z. K. Baker","year":"2004","unstructured":"Z. K. Baker, V. K. Prasanna. Time and area efficient reconfigurable pattern matching on FPGAs. In Proceedings of ACM International Symposium on Field-Programmable Gate Arrays, ACM, Monterey, USA, pp. 223\u2013232, 2004."},{"issue":"1","key":"660_CR12","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MM.2004.1268997","volume":"24","author":"S. Dharmapurikar","year":"2004","unstructured":"S. Dharmapurikar, P. Krishnamurthy, T. S. Sproull, J. W. Lockwood. Deep packet inspection using parallel bloom filters. IEEE Micro, vol. 24, no. 1, pp. 52\u201361, 2004.","journal-title":"IEEE Micro"},{"issue":"3","key":"660_CR13","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/JSSC.2005.864128","volume":"41","author":"K. Pagiamtzis","year":"2006","unstructured":"K. Pagiamtzis, A. Sheikholeslami. Content-addressable memory (CAM) circuits and architectures: A tutorial and survey. IEEE Journal of Solid-State Circuits, vol. 41, no. 3, pp. 712\u2013727, 2006.","journal-title":"IEEE Journal of Solid-State Circuits"},{"issue":"6","key":"660_CR14","doi-asserted-by":"crossref","first-page":"956","DOI":"10.1109\/4.924858","volume":"6","author":"H. Miyatake","year":"2001","unstructured":"H. Miyatake, M. Tanaka, Y. Mori. A design for high-speedlow power CMOS fully parallel content-addressable memory macros. IEEE Journal of Solid-State Circuits, vol. 6, no. 6, pp. 956\u2013968, 2001.","journal-title":"IEEE Journal of Solid-State Circuits"},{"issue":"11","key":"660_CR15","doi-asserted-by":"crossref","first-page":"1958","DOI":"10.1109\/JSSC.2003.818139","volume":"38","author":"I. Arsovski","year":"2003","unstructured":"I. Arsovski, A. Sheikholeslami. A mismatch-dependent power allocation technique for match-line sensing in content-addressable memories. IEEE Journal of Solid-State Circuits, vol. 38, no. 11, pp. 1958\u20131966, 2003.","journal-title":"IEEE Journal of Solid-State Circuits"},{"key":"660_CR16","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/NAS.2008.52","volume-title":"Proceedings of International Conference on Networking, Architecture, and Storage","author":"H. Cai","year":"2008","unstructured":"H. Cai, P. Ge, J. Wang. Applications of bloom filters in peer-to-peer systems: Issues and questions. In Proceedings of International Conference on Networking, Architecture, and Storage, IEEE, Chongqing, China, pp. 97\u2013103, 2008."},{"issue":"4","key":"660_CR17","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1109\/JSSC.2003.809515","volume":"38","author":"C. S. Lin","year":"2003","unstructured":"C. S. Lin, J. C. Chang, B. D. Liu. A low-power precomputation-based fully parallel content-addressable memory. IEEE Journal of Solid-State Circuits, vol. 38, no. 4, pp. 654\u2013662, 2003.","journal-title":"IEEE Journal of Solid-State Circuits"},{"issue":"7","key":"660_CR18","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. H. Bloom","year":"1970","unstructured":"B. H. Bloom. Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM, vol. 13, no. 7, pp. 422\u2013426, 1970.","journal-title":"Communications of the ACM"},{"issue":"2","key":"660_CR19","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter, M. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143\u2013154, 1979.","journal-title":"Journal of Computer and System Sciences"},{"issue":"3","key":"660_CR20","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/LCOMM.2006.1603387","volume":"10","author":"I. Kaya","year":"2006","unstructured":"I. Kaya, T. Kocak. Low-power Bloom filter architecture for deep packet inspection. IEEE Communications Letters, vol. 10, no. 3, pp. 210\u2013212, 2006.","journal-title":"IEEE Communications Letters"},{"key":"660_CR21","doi-asserted-by":"crossref","unstructured":"I. Sourdis, D. Pnevmatikatos. Fast, large-scale string match for a network intrusion detection system. In Proceedings of International Conference on Field Programmable Logic and Applications, pp. 880\u2013889, 2003.","DOI":"10.1007\/978-3-540-45234-8_85"},{"key":"660_CR22","first-page":"111","volume-title":"Proceedings of IEEE Symposium on Field-Programmable Custom Computer","author":"B. L. Hutchings","year":"2006","unstructured":"B. L. Hutchings, R. Franklin, D. Carver. Assisting network intrusion detection with reconfigurable hardware. In Proceedings of IEEE Symposium on Field-Programmable Custom Computer, IEEE, Napa, USA, pp. 111\u2013120, 2006."},{"key":"660_CR23","first-page":"12","volume-title":"Proceedings of DARPA Information Survivability Conference and Exposition","author":"R. P. Lippmann","year":"2000","unstructured":"R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, M. A. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In Proceedings of DARPA Information Survivability Conference and Exposition, IEEE, Hilton Head, USA, vol. 2, pp. 12\u201326, 2000."}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0660-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-012-0660-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0660-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T17:40:24Z","timestamp":1743961224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-012-0660-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["660"],"URL":"https:\/\/doi.org\/10.1007\/s11633-012-0660-2","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8]]}}}