{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:26:37Z","timestamp":1725776797856},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6133995","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Design and Development of an OpenFlow Compliant Smart Gigabit Switch"],"prefix":"10.1109","author":[{"given":"G.","family":"Antichi","sequence":"first","affiliation":[]},{"given":"A.","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"S.","family":"Giordano","sequence":"additional","affiliation":[]},{"given":"G.","family":"Procissi","sequence":"additional","affiliation":[]},{"given":"D.","family":"Ficara","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425868"},{"journal-title":"Xfas Fast and Compact Signature Matching","year":"2007","author":"smith","key":"17"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"16","first-page":"1","article-title":"A hybrid finite automaton for practical deep packet inspection","author":"becchi","year":"2009","journal-title":"in Proceedings of CoNext'07"},{"journal-title":"An encoded version of reg-ex database from Cisco Systems provided for research purposes","year":"0","author":"eatherton","key":"13"},{"key":"14","first-page":"339","article-title":"Algorithms to accelerate multiple regular expressions matching for deep packet inspection","author":"kumar","year":"0","journal-title":"Proc of SIGCOMM '06"},{"journal-title":"Snort Lightweight Intrusion Detection for Networks","year":"0","key":"11"},{"journal-title":"Bro A system for detecting network intruders in real time","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/40.988693"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2010.5686971"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06133995.pdf?arnumber=6133995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:18:00Z","timestamp":1490091480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6133995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6133995","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}