{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:59:19Z","timestamp":1725490759008},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/fpt.2003.1275733","type":"proceedings-article","created":{"date-parts":[[2004,6,30]],"date-time":"2004-06-30T15:38:21Z","timestamp":1088609901000},"page":"68-74","source":"Crossref","is-referenced-by-count":7,"title":["A pattern-matching co-processor for network intrusion detection systems"],"prefix":"10.1109","author":[{"given":"C.R.","family":"Clark","sequence":"first","affiliation":[]},{"given":"D.E.","family":"Schimmel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Efficient Reconfigurable Logic Circuits for Matching Complex Network Intrusion Detection Patterns","author":"clark","year":"2003","journal-title":"Proc FPL 2003"},{"key":"ref11","first-page":"175","article-title":"JHDL-An HDL for Reconfigurable Systems","author":"ellows","year":"1998","journal-title":"Proceedings of IEEE FCCM 1998"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009253"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SPIRE.2000.878193"},{"key":"ref4","article-title":"Implementation of a Content-Scanning Module for an Internet Firewall","author":"james","year":"2003","journal-title":"Proc FCCM 2003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2002.1106687"},{"key":"ref6","article-title":"Fast Content-Based Packet Handling for Intrusion Detection","author":"fisk","year":"2001","journal-title":"Technical Report UCSD CS2001-0670"},{"article-title":"Snort User's Manual","year":"0","author":"roesch","key":"ref5"},{"key":"ref8","article-title":"Fast Regular Expression Matching using FPGAs","author":"sidhu","year":"2001","journal-title":"Proceedings of IEEE FCCM 2001"},{"key":"ref7","article-title":"Towards Faster String Matching for Intrusion Detection","author":"jason coit","year":"2001","journal-title":"DARPA Information Survivability Conference"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/2.963131"},{"key":"ref1","article-title":"State of the Practice of Intrusion Detection Technologies","author":"allen","year":"1999","journal-title":"Technical Report CMU\/SEI-99-TR-028"},{"key":"ref9","first-page":"111","article-title":"Assisting Network Intrusion Detection with Reconfigurable Hardware","author":"franklin","year":"2002","journal-title":"Proceedings of IEEE FCCM 2002"}],"event":{"name":"2003 IEEE International Conference on Field-Programmable Technology (FPT)","acronym":"FPT-03","location":"Tokyo, Japan"},"container-title":["Proceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT) (IEEE Cat. No.03EX798)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8988\/28529\/01275733.pdf?arnumber=1275733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T22:39:07Z","timestamp":1489444747000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1275733\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/fpt.2003.1275733","relation":{},"subject":[]}}