{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:15:52Z","timestamp":1725768952655},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/atnac.2016.7878812","type":"proceedings-article","created":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:33:26Z","timestamp":1489692806000},"page":"217-224","source":"Crossref","is-referenced-by-count":4,"title":["Hardware acceleration of signature matching through multi-layer transition bit masking"],"prefix":"10.1109","author":[{"given":"Subramanian Shiva","family":"Shankar","sequence":"first","affiliation":[]},{"given":"PinXing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Herkersdorf","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Wild","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159952"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195546"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402983"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358840"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"ref4","article-title":"Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics","author":"handley","year":"2001","journal-title":"Proceedings of the 10th USENIX Symposium"},{"journal-title":"Parks Associates","year":"0","author":"sappington","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISICIR.2014.7029481"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515770"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2007.4317817"},{"journal-title":"Team Cymru Threat Intelligence Group","article-title":"SOHO Pharming","year":"0","key":"ref2"},{"journal-title":"securityevaluators com","year":"0","author":"holcomb","key":"ref1"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"1979","author":"ullman","key":"ref9"},{"journal-title":"Regular Expression Processor","year":"0","author":"becchi","key":"ref20"},{"year":"0","key":"ref22"},{"journal-title":"Snort Open Source IDS\/IPS","year":"0","key":"ref21"}],"event":{"name":"2016 26th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2016,12,7]]},"location":"Dunedin, New Zealand","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 26th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7875239\/7878760\/07878812.pdf?arnumber=7878812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,27]],"date-time":"2017-03-27T23:03:01Z","timestamp":1490655781000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7878812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/atnac.2016.7878812","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}