{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T15:51:19Z","timestamp":1746805879155,"version":"3.40.5"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218421","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T17:33:36Z","timestamp":1440437616000},"page":"540-548","source":"Crossref","is-referenced-by-count":13,"title":["Accelerating regular expression matching over compressed HTTP"],"prefix":"10.1109","author":[{"given":"Michela","family":"Becchi","sequence":"first","affiliation":[]},{"given":"Anat","family":"Bremler-Barr","sequence":"additional","affiliation":[]},{"given":"David","family":"Hay","sequence":"additional","affiliation":[]},{"given":"Omer","family":"Kochba","sequence":"additional","affiliation":[]},{"given":"Yaron","family":"Koral","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2011","key":"ref33","article-title":"Alexa: The web information company"},{"article-title":"Regular expression processor","year":"0","author":"becchi","key":"ref32"},{"year":"0","key":"ref31","article-title":"PCRE - perl compatible regular expressions"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2396556.2396603"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/ACSAC.2006.17","article-title":"Backtracking algorithmic complexity attacks against a nids","author":"smith","year":"2006","journal-title":"Computer Security Applications Conference 2006 ACSAC '06 22nd Annual"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2172456"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2004.1414952"},{"article-title":"Hardware accelerated compression","year":"2006","author":"franklin","key":"ref17"},{"article-title":"Method and apparatus for efficient hardware based deflate","year":"2007","author":"ma","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1996.0023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700208"},{"article-title":"Gzip file format specification","year":"1996","author":"deutsch","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.01.017"},{"year":"1999","key":"ref3","article-title":"Hyper[t]ext [t]ransfer [p]rotocol- [http]\/1.1"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"2007","author":"hopcroft","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962596"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"year":"0","key":"ref2","article-title":"Snort: The Open Source Network Intrusion Detection System"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"year":"2014","key":"ref1","article-title":"Usage of Compression for websites"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48452-3_1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45123-4_16"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48452-3_2","article-title":"A general practical approach to pattern matching over ziv-lempel compressed text","author":"navarro","year":"1999","journal-title":"10th Annual Symposium on Combinatorial Pattern Matching (CPM 99)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225288"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2000.838180"},{"key":"ref26","article-title":"A fast algorithm for multi-pattern searching","author":"wu","year":"1994","journal-title":"Department of Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2011.5986030"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","start":{"date-parts":[[2015,4,26]]},"location":"Kowloon, Hong Kong","end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218421.pdf?arnumber=7218421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T14:12:55Z","timestamp":1498227175000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218421","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}