{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:46:43Z","timestamp":1769748403977,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/icsamos.2007.4285750","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:12:21Z","timestamp":1186600341000},"page":"186-193","source":"Crossref","is-referenced-by-count":23,"title":["A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Vassilis","family":"Dimopoulos","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Papaefstathiou","sequence":"additional","affiliation":[]},{"given":"Dionisios","family":"Pnevmatikatos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"On the importance of header classification in hw\/sw network intrusion detection systems","author":"dimopoulos","year":"2005","journal-title":"Proc 10th Panhellenic Conference on Informatics (PCI 2005)"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1145\/968280.968312","article-title":"Time and Area Efficient Reconfigurable Pattern Matching on FPGAs","author":"baker","year":"2004","journal-title":"Proceedings of FPGA"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.25"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.50"},{"key":"ref14","article-title":"Hashing + Memory = Low Cost, Exact Pattern Matching","author":"papadopoulos","year":"2005","journal-title":"Proceedings of 15th InternationalConference on Field Programmable Logic and Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.46"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515804"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.41"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1109\/ASAP.2005.8","article-title":"A parallel automaton string matching with pre-hashing and root-indexing techniques for content filtering coprocessor","author":"tseng","year":"2005","journal-title":"Proceedings of the 16th IEEE International Conference on Application-Specific Systems Architectures and Processors (ASAP)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270302"},{"key":"ref4","article-title":"Deterministic Memory-Efficient String Mathcing for Intrusion Detection","author":"tuck","year":"2004","journal-title":"Proceedings of the IEEE INFOCOM Conference"},{"key":"ref3","article-title":"A fast algorithm for multi-pattern searching","author":"wu","year":"1994","journal-title":"Techical Report TR-94&#x2013;17 University of Arisona"},{"key":"ref6","article-title":"Snort - lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA&#x2019;99 13th System Administration Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"ref8","year":"2002"},{"key":"ref7","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref9","year":"2002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311246"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185372"}],"event":{"name":"2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation","location":"Samos, Greece","start":{"date-parts":[[2007,7,16]]},"end":{"date-parts":[[2007,7,19]]}},"container-title":["2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4285717\/4285718\/04285750.pdf?arnumber=4285750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:57:14Z","timestamp":1737352634000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4285750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icsamos.2007.4285750","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}