{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:19:22Z","timestamp":1758705562164,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T00:00:00Z","timestamp":1412121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National High-Tech Research and Development Program of China","award":["2011AA010703","2011AA010705"],"award-info":[{"award-number":["2011AA010703","2011AA010705"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303260","61472184","61321491","61 272546"],"award-info":[{"award-number":["61303260","61472184","61321491","61 272546"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Strategic Priority Research Program of the Chinese Academy of Sciences","award":["XDA06030200"],"award-info":[{"award-number":["XDA06030200"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1017588","CNS-1017598","CCF-1347953","CNS-1318563"],"award-info":[{"award-number":["CNS-1017588","CNS-1017598","CCF-1347953","CNS-1318563"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/jsac.2014.2358839","type":"journal-article","created":{"date-parts":[[2014,9,18]],"date-time":"2014-09-18T18:39:04Z","timestamp":1411065544000},"page":"1797-1809","source":"Crossref","is-referenced-by-count":19,"title":["Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation"],"prefix":"10.1109","volume":"32","author":[{"given":"Tingwen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Alex X.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jinqiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934986"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2309014"},{"key":"ref31","first-page":"1","article-title":"Bypassing space explosion in regular expression matching for network intrusion detection and prevention systems","author":"patel","year":"0","journal-title":"Proc 19th Annu NDSS"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_17"},{"journal-title":"Stirling Numbers of the Second Kind","year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636093"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BF02523688"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"journal-title":"Application layer packet classifier for linux","year":"0","author":"levandoski","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159952"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2089639"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185359"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"journal-title":"i-dfa A Novel Deterministic Finite Automaton Without State Explosion","year":"2010","author":"xu","key":"ref18"},{"journal-title":"TFA A tunable finite automaton for regular expression matching","year":"2013","author":"xu","key":"ref19"},{"key":"ref28","first-page":"227","article-title":"Fast regular expression matching using FPGAs","author":"sidhu","year":"0","journal-title":"Proc IEEE FCCM"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1555815.1555760","article-title":"Scalable high performance main memory system using phase-change memory technology","volume":"37","author":"qureshi","year":"2009","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2013.6665178"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923720"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733572"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1109\/TVLSI.2008.2012011","article-title":"Realizing a sub-linear time string-matching algorithm with a hardware accelerator using bloom filters","volume":"17","author":"lin","year":"2009","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402983"},{"key":"ref7","first-page":"187","article-title":"XFA: Faster signature matching with extended automata","author":"smith","year":"0","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","article-title":"Bro: A system for detecting network intruders in real-time","volume":"31","author":"vern","year":"1999","journal-title":"Comput Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848024"},{"key":"ref1","first-page":"229","article-title":"Snort&#x2014;Lightweight intrusion detection for networks","author":"roesch","year":"0","journal-title":"Proc USENIX LISA"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1882486.1882496"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2181411"},{"key":"ref24","first-page":"111","article-title":"Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems","author":"meiners","year":"0","journal-title":"19th USENIX Security"},{"key":"ref23","first-page":"1","article-title":"$\\hbox{StriD}^{2}\\hbox{FA}$: Scalable regular expression matching for deep packet inspection","author":"wang","year":"0","journal-title":"Proc IEEE ICC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2256466"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/6969128\/06902788.pdf?arnumber=6902788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:20Z","timestamp":1642003160000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6902788\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":36,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2014.2358839","relation":{},"ISSN":["0733-8716"],"issn-type":[{"type":"print","value":"0733-8716"}],"subject":[],"published":{"date-parts":[[2014,10]]}}}