{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:14:07Z","timestamp":1730279647053,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwcmc58020.2023.10183026","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:20:43Z","timestamp":1689960043000},"page":"488-493","source":"Crossref","is-referenced-by-count":1,"title":["Work Balancing vs. Load Balancing for Network IDS Parallelization"],"prefix":"10.1109","author":[{"given":"Hossein","family":"Doroud","sequence":"first","affiliation":[{"name":"TU Berlin,School of Electrical Engineering and Computer Science,Germany"}]},{"given":"Tobias","family":"Wiese","sequence":"additional","affiliation":[{"name":"CQSE GmbH,Germany"}]},{"given":"Felix","family":"Erlacher","sequence":"additional","affiliation":[{"name":"Cancoma&#x002B;d,Innsbruck,Austria"}]},{"given":"Falko","family":"Dressler","sequence":"additional","affiliation":[{"name":"TU Berlin,School of Electrical Engineering and Computer Science,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00806-9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2004.1266118"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2973992"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2013.26"},{"article-title":"Load Balancing by Ruleset Partition for Parallel IDS on Multi-core Processors","volume-title":"in IEEE International Conference on Computer Communications and Networks (ICCCN 2013)","author":"Jiang","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2011.6006063"},{"key":"ref7","article-title":"A Dynamic Scalable Parallel Network-based Intrusion Detection System using Intelligent Rule Ordering","volume-title":"Masters Thesis, informatikk","author":"Huy","year":"2017"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2008.4510736"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330137"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928926"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.18"},{"key":"ref12","first-page":"229","article-title":"Snort-Lightweight Intrusion Detection for Networks","volume-title":"in 13th USENIX Conference on System Administration (LISA 1999)","author":"Roesch"},{"article-title":"Snort 2.1 Intrusion Detection","year":"2004","author":"Beale","key":"ref13"},{"key":"ref14","article-title":"Snort Users Manual","author":"Caswell","year":"2004","journal-title":"The Snort Project, Manual"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1428609"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"issue":"1","key":"ref18","article-title":"Snort3 rules exact string matching based on FPGA","volume":"1","author":"Armstrong","year":"2021","journal-title":"SPAST Abstracts"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT47744.2019.9001286"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342041"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.03.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/569\/4\/042041"},{"key":"ref23","first-page":"631","article-title":"Hyperscan: A Fast Multi-pattern Regex Matcher for Modern CPUs","author":"Wang","year":"2019","journal-title":"in 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2019)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255099"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.05.037"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8648137"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3229598.3229601"}],"event":{"name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2023,6,19]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2023,6,23]]}},"container-title":["2023 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10182387\/10182368\/10183026.pdf?arnumber=10183026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T04:28:31Z","timestamp":1712982511000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10183026\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iwcmc58020.2023.10183026","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}