{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:12:42Z","timestamp":1730283162805,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/milcom.2017.8170859","type":"proceedings-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T22:40:39Z","timestamp":1513032039000},"page":"406-411","source":"Crossref","is-referenced-by-count":2,"title":["Cyber situational awareness enhancement with regular expressions and an evaluation methodology"],"prefix":"10.1109","author":[{"given":"Hyun Kyoo","family":"Park","sequence":"first","affiliation":[]},{"given":"Min Sik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Moosung","family":"Park","sequence":"additional","affiliation":[]},{"given":"Kyungho","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Supplementary Material for An Efficient and Scalable Semiconductor Architecture for Parallel Automata Processing","author":"dlugosch","year":"2013","journal-title":"IEEE TPDS"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1518\/001872095779049543"},{"year":"2017","journal-title":"SpamAssassin the open-source spam filter 3 4 1","key":"ref10"},{"year":"0","journal-title":"Regexbench","key":"ref6"},{"key":"ref11","first-page":"2090","article-title":"Grammer-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems","volume":"e99","author":"min","year":"2016","journal-title":"IEICE Trans Inf & Syst"},{"year":"0","journal-title":"Sniffles","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/GLOCOM.2015.7417740"},{"key":"ref7","article-title":"Cyber Situational Awareness","author":"matthews","year":"2016","journal-title":"Army Cyber Institute West Point"},{"key":"ref2","first-page":"3","article-title":"Cyberspace Operations","year":"2013","journal-title":"US JCS"},{"year":"2017","journal-title":"Snort User Manual 2 9 9","key":"ref9"},{"year":"0","journal-title":"REmatch High-performance Regular Expression Matching for Network Security Petabi Inc","key":"ref1"}],"event":{"name":"2017 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2017,10,23]]},"location":"Baltimore, MD","end":{"date-parts":[[2017,10,25]]}},"container-title":["MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8125230\/8170714\/08170859.pdf?arnumber=8170859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:52:27Z","timestamp":1516056747000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8170859\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/milcom.2017.8170859","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}