{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T03:52:09Z","timestamp":1722916329750},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icc.2005.1494365","type":"proceedings-article","created":{"date-parts":[[2005,8,16]],"date-time":"2005-08-16T15:17:27Z","timestamp":1124205447000},"page":"301-305","source":"Crossref","is-referenced-by-count":1,"title":["A 10Gb\/s wire-speed firewall system using reconfigurable processors"],"prefix":"10.1109","volume":"1","author":[{"given":"M.","family":"Katayama","sequence":"first","affiliation":[]},{"given":"H.","family":"Kai","sequence":"additional","affiliation":[]},{"given":"J.","family":"Yoshida","sequence":"additional","affiliation":[]},{"given":"H.","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"K.","family":"Shiomoto","sequence":"additional","affiliation":[]},{"given":"N.","family":"Yamanaka","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref11","article-title":"Tracing Anonymous Packets to Their Approximate Source","author":"burch","year":"2000","journal-title":"Proc 14th Conf Systems Administration"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804827"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1771","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"rekhter","year":"1995"},{"key":"ref14","article-title":"Using Re-Configurable Technology in High-Speed Packet Processing","author":"yamada","year":"2004","journal-title":"Proc ICNP'04"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.1997.624601"},{"year":"0","key":"ref16"},{"journal-title":"CERT advisory CA-2003-04 MS-SQL server worm","year":"0","key":"ref4"},{"journal-title":"CERT advisory ca-2001-26 Nimda worm","year":"0","key":"ref3"},{"journal-title":"CERT Incident Note IN-2004-01","year":"0","key":"ref6"},{"journal-title":"CERT Advisory CA-2003-20 W32\/Blaster Worm","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209211"},{"journal-title":"CERT Incident Note IN-2004-02","year":"0","key":"ref7"},{"journal-title":"CERT Incident Note IN-2001&#x2013;09","article-title":"Code Red II:&#x201D; Another Worm Exploiting Buffer Overflow In IIS Indexing Service DLL","year":"0","key":"ref2"},{"key":"ref1","article-title":"The internet worm incident","author":"spafford","year":"1989","journal-title":"ESEC'89 2nd European Software Engineering Conference"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209209"}],"event":{"name":"IEEE International Conference on Communications, 2005. ICC 2005. 2005","location":"Seoul, Korea"},"container-title":["IEEE International Conference on Communications, 2005. ICC 2005. 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9996\/32109\/01494365.pdf?arnumber=1494365","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T22:37:33Z","timestamp":1552775853000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1494365\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icc.2005.1494365","relation":{},"subject":[]}}