{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:13:45Z","timestamp":1725621225229},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fpl.2005.1515697","type":"proceedings-article","created":{"date-parts":[[2005,10,12]],"date-time":"2005-10-12T13:27:51Z","timestamp":1129123671000},"page":"45-50","source":"Crossref","is-referenced-by-count":4,"title":["High-speed and memory efficient TCP stream scanning using FPGA"],"prefix":"10.1109","author":[{"given":"Y.","family":"Sugawara","sequence":"first","affiliation":[]},{"given":"M.","family":"Inaba","sequence":"additional","affiliation":[]},{"given":"K.","family":"Hiraki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2002.1106687"},{"journal-title":"Enterasys Intrusion Defense","year":"2003","key":"2"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30117-2_50","article-title":"Over 10gbps string matching mechanism for multi-stream packet scanning systems","author":"sugawara","year":"2004","journal-title":"Proc of 14th Intl Conf on Field Programmable Logic and Applications(FPL '04)"},{"key":"1","article-title":"Snort - Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA'99 13th Administration Conference"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/235160.235162"},{"key":"5","first-page":"89","article-title":"Architecture for a hardware based, TCP\/IP content scanning system","author":"schuehler","year":"2003","journal-title":"Proc IEEE Symp High-Performance Interconnects (HOTI)"},{"key":"4","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1007\/978-3-540-45234-8_142","article-title":"Exploiting stateful inspection of network security in reconfigurable hardware","author":"li","year":"2003","journal-title":"Proc of 13th Intl Conf on Field Programmable Logic and Applications(FPL '03)"},{"journal-title":"IP Monitoring Project","year":"0","key":"9"},{"key":"8","article-title":"Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics","author":"handley","year":"2001","journal-title":"Proc of 10th USENIX Security Symposium"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/65.642356"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2002.1039268"}],"event":{"name":"International Conference on Field Programmable Logic and Applications, 2005.","location":"Tampere, Finland"},"container-title":["International Conference on Field Programmable Logic and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10158\/32467\/01515697.pdf?arnumber=1515697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T20:02:56Z","timestamp":1497643376000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1515697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/fpl.2005.1515697","relation":{},"subject":[]}}