{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:46:43Z","timestamp":1742402803527,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/saint.2004.1266118","type":"proceedings-article","created":{"date-parts":[[2004,5,25]],"date-time":"2004-05-25T20:11:16Z","timestamp":1085515876000},"page":"208-215","source":"Crossref","is-referenced-by-count":31,"title":["Performance analysis of content matching intrusion detection systems"],"prefix":"10.1109","author":[{"given":"S.","family":"Antonatos","sequence":"first","affiliation":[]},{"given":"K.G.","family":"Anagnostakis","sequence":"additional","affiliation":[]},{"given":"E.P.","family":"Markatos","sequence":"additional","affiliation":[]},{"given":"M.","family":"Polychronakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"A fast algorithm for multi-pattern searching","volume":"tr 94 17","author":"wu","year":"1994","journal-title":"Technical Report"},{"key":"13","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 1999 USENIX LISA Systems Administration Conference"},{"journal-title":"Snort 2 0 - Detection Revisited","year":"2002","key":"14"},{"year":"0","author":"mccann","key":"11"},{"key":"12","first-page":"279","article-title":"Imbench: Portable tools for performance analysis","author":"mcvoy","year":"1996","journal-title":"Proc 1996 Usenix Technical Conf"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-31","author":"bace","year":"2001","journal-title":"Intrusion Detection Systems"},{"key":"2","article-title":"E2xB: A domain-specific string matching algorithm for intrusion detection","author":"anagnostakis","year":"2003","journal-title":"Proceedings of the 18th IFIP International Information Security Conference (SEC2003)"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"10","article-title":"ExB: Exclusion-based signature matching for intrusion detection","author":"markatos","year":"2002","journal-title":"Proceedings of CCN'02"},{"key":"7","article-title":"An analysis of fast string matching applied to content-based forwarding and intrusion detection","volume":"cs2001 670","author":"fisk","year":"2002","journal-title":"Technical Report"},{"key":"6","article-title":"Measurement and analysis of real network traffic","author":"courcoubetis","year":"1999","journal-title":"7th Hellenic Conf Informatics (HCI 99)"},{"key":"5","article-title":"Towards faster pattern matching for intrusion detection, or exceeding the speed of snort","author":"coit","year":"2002","journal-title":"Proc DARPA Information Survivability Conf and Exposition (DISCEX III)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380100608"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931"}],"event":{"name":"2004 International Symposium on Applications and the Internet","acronym":"SAINT-04","location":"Tokyo, Japan"},"container-title":["CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8941\/28312\/01266118.pdf?arnumber=1266118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:32:15Z","timestamp":1497598335000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1266118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/saint.2004.1266118","relation":{},"subject":[]}}