{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:18:58Z","timestamp":1725491938002},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/socc.2011.6085117","type":"proceedings-article","created":{"date-parts":[[2011,11,23]],"date-time":"2011-11-23T16:54:27Z","timestamp":1322067267000},"page":"347-352","source":"Crossref","is-referenced-by-count":0,"title":["High performance multi-engine regular expression processing"],"prefix":"10.1109","author":[{"given":"Thianantha","family":"Arumugam","sequence":"first","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]},{"given":"Dwayne","family":"Burns","sequence":"additional","affiliation":[]},{"given":"Vishalini","family":"Vasu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.43"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71431-6_17"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/FPGA.2003.1227239"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.9"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948189"},{"key":"10","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/FPGA.2002.1106666","article-title":"Assisting network intrusion detection with reconfigurable hardware","author":"hutchings","year":"2002","journal-title":"Field-Programmable Custom Computing Machines 2002 Proceedings 10th Annual IEEE Symposium of"},{"key":"7","article-title":"Gigabit rate packet pattern-matching using TCAM","author":"yu","year":"2004","journal-title":"Computer"},{"key":"6","first-page":"47","article-title":"Granidt: Towards gigabit rate network intrusion detection technology","author":"gokhale","year":"2002","journal-title":"Field-Programmable Logic and Applications Reconfigurable Computing Is Going Mainstream"},{"key":"5","first-page":"11","article-title":"A pattern matching model for misuse intrusion detection","author":"kumar","year":"1994","journal-title":"Proceedings of the 17th National Computer Security Conference"},{"key":"4","first-page":"229","article-title":"Snort-lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th USENIX Conference on System Administration"},{"key":"9","first-page":"227","article-title":"Fast regular expression matching using FPGAs","author":"sidhu","year":"2001","journal-title":"The 9th Annual IEEE Symposium on Field-programmable Custom Computing Machines 2001"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"}],"event":{"name":"2011 IEEE 24th International SOC Conference (SOCC)","start":{"date-parts":[[2011,9,26]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,28]]}},"container-title":["2011 IEEE International SOC Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6076821\/6085068\/06085117.pdf?arnumber=6085117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:15:13Z","timestamp":1497939313000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6085117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/socc.2011.6085117","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}