{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:44:47Z","timestamp":1729673087078,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/iscisc.2014.6994046","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T22:11:01Z","timestamp":1419977461000},"page":"192-198","source":"Crossref","is-referenced-by-count":3,"title":["Scalable, high-throughput and modular hardware-based string matching algorithm"],"prefix":"10.1109","author":[{"given":"Mohammad Hossein","family":"Hajiabadi","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Saidi","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Behdadfar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.11.0110.0381"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062179"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.17"},{"key":"12","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/TVLSI.2009.2028346","article-title":"Efficient pattern matching algorithm for memory architecture","volume":"19","author":"cheng-hung","year":"2011","journal-title":"Very Large Scale Integration (VLSI) Systems IEEE Transactions on"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.072210.00075"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912036"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.38"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2006.1639434"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2004.6"},{"key":"6","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1007\/978-3-540-45234-8_85","article-title":"Fast, large-scale string match for a 10gbps fpga-based network intrusion detection system","volume":"2778","author":"sourdis","year":"2003","journal-title":"Field Programmable Logic and Application"},{"key":"5","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/3-540-46117-5_48","article-title":"Specialized hardwar e for deep network packet filtering","volume":"2438","author":"cho","year":"2002","journal-title":"Field-Programmable Logic and Applications Reconfigurable Computing Is Going Mainstream"},{"key":"4","first-page":"125","article-title":"Deep packet filter with dedicated logic and read only memories","author":"mangione-smith","year":"2004","journal-title":"Proceedings of the 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM '04)"},{"key":"9","first-page":"112","article-title":"A high throughput string matching architecture for intrusion detection and prev ention","author":"lin","year":"2005","journal-title":"Computer Architecture 2005 ISCA '05 Proceedings 32nd International Symposium on"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.44"}],"event":{"name":"2014 11th International ISC Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2014,9,3]]},"location":"Tehran, Iran","end":{"date-parts":[[2014,9,4]]}},"container-title":["2014 11th International ISC Conference on Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975720\/6994006\/06994046.pdf?arnumber=6994046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T22:54:40Z","timestamp":1498172080000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6994046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2014.6994046","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}