{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:55:00Z","timestamp":1768420500270,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,12,3]]},"DOI":"10.1145\/1185347.1185359","type":"proceedings-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T20:15:56Z","timestamp":1168978556000},"page":"81-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":128,"title":["Advanced algorithms for fast and scalable deep packet inspection"],"prefix":"10.1145","author":[{"given":"Sailesh","family":"Kumar","sequence":"first","affiliation":[{"name":"Washington University"}]},{"given":"Jonathan","family":"Turner","sequence":"additional","affiliation":[{"name":"Washington University"}]},{"given":"John","family":"Williams","sequence":"additional","affiliation":[{"name":"Cisco Systems"}]}],"member":"320","published-online":{"date-parts":[[2006,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"e_1_3_2_1_2_1","volume-title":"Introduction to Automata Theory, Languages, and Computation,\" Addison Wesley","author":"Hopcroft J. E.","year":"1979","unstructured":"J. E. Hopcroft and J. D. Ullman , \" Introduction to Automata Theory, Languages, and Computation,\" Addison Wesley , 1979 . J. E. Hopcroft and J. D. Ullman, \"Introduction to Automata Theory, Languages, and Computation,\" Addison Wesley, 1979."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_4_1","unstructured":"Bro Intrusion detection system Vern Paxson http:\/\/www.icir.org\/vern\/bro-info.html  Bro Intrusion detection system Vern Paxson http:\/\/www.icir.org\/vern\/bro-info.html"},{"key":"e_1_3_2_1_5_1","volume-title":"November","author":"Roesch M.","year":"1999","unstructured":"M. Roesch , \"Snort : Lightweight intrusion detection for networks,\" Systems Administration Conference (LISA) , November 1999 . M. Roesch, \"Snort: Lightweight intrusion detection for networks,\" Systems Administration Conference (LISA), November 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/974044.974078"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"B. Commentz-Walter \"A string matching algorithm fast on the average \" Proceedings of ICALP pages 118--132 July 1979.   B. Commentz-Walter \"A string matching algorithm fast on the average \" Proceedings of ICALP pages 118--132 July 1979.","DOI":"10.1007\/3-540-09510-1_10"},{"key":"e_1_3_2_1_9_1","volume-title":"Univ of Arizona","author":"Wu S.","year":"1994","unstructured":"S. Wu , U. Manber ,\" A fast algorithm for multi-pattern searching,\" Tech. R. TR-94-17 , Univ of Arizona , 1994 . S. Wu, U. Manber,\" A fast algorithm for multi-pattern searching,\" Tech. R. TR-94-17, Univ of Arizona, 1994."},{"key":"e_1_3_2_1_10_1","unstructured":"Fang Yu etal \"Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection\" UCB tech. report EECS-2005-8.  Fang Yu et al. \"Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection\" UCB tech. report EECS-2005-8."},{"key":"e_1_3_2_1_11_1","first-page":"333","article-title":"Deterministic memory-efficient string matching algorithms for intrusion detection","volume":"2004","author":"Tuck N.","unstructured":"N. Tuck , T. Sherwood , B. Calder , and G. Varghese , \" Deterministic memory-efficient string matching algorithms for intrusion detection ,\" IEEE Infocom 2004 , pages 333 -- 340 . N. Tuck, T. Sherwood, B. Calder, and G. Varghese, \"Deterministic memory-efficient string matching algorithms for intrusion detection,\" IEEE Infocom 2004, pages 333--340.","journal-title":"IEEE Infocom"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"e_1_3_2_1_13_1","first-page":"258","article-title":"Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching","author":"Sourdis I.","year":"2004","unstructured":"I. Sourdis , \" Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching ,\" FCCM , 2004 , pp. 258 -- 267 . I. Sourdis et al, \"Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching,\" FCCM, 2004, pp. 258--267.","journal-title":"FCCM"},{"key":"e_1_3_2_1_14_1","volume-title":"Bitwise Optimised CAM for Network Intrusion Detection Systems,\" IEEE FPL","author":"Yusuf S.","year":"2005","unstructured":"S. Yusuf and W. Luk , \" Bitwise Optimised CAM for Network Intrusion Detection Systems,\" IEEE FPL 2005 . S. Yusuf and W. Luk, \"Bitwise Optimised CAM for Network Intrusion Detection Systems,\" IEEE FPL 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1058426.1058885"},{"key":"e_1_3_2_1_16_1","volume-title":"Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns,\" In 13th FCCM conference","author":"Clark C. R.","unstructured":"C. R. Clark and D. E. Schimmel , \" Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns,\" In 13th FCCM conference . C. R. Clark and D. E. Schimmel, \"Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns,\" In 13th FCCM conference."},{"key":"e_1_3_2_1_17_1","volume-title":"USA","author":"Moscola J.","year":"2003","unstructured":"J. Moscola , of a content-scanning module for an internet firewall,\" IEEE Workshop on FPGAs for Custom Computing Machines, Napa, CA , USA , April 2003 . J. Moscola, et al, \"Implementation of a content-scanning module for an internet firewall,\" IEEE Workshop on FPGAs for Custom Computing Machines, Napa, CA, USA, April 2003."},{"key":"e_1_3_2_1_18_1","first-page":"26","article-title":"On representatives of subsets","volume":"10","year":"1936","unstructured":"Phillip Hall , \" On representatives of subsets ,\" J. London Math. Soc. ,vol. 10 , pp. 26 -- 30 , 1936 . Phillip Hall, \"On representatives of subsets,\" J. London Math. Soc.,vol. 10, pp. 26--30, 1936.","journal-title":"J. London Math. Soc."},{"key":"e_1_3_2_1_19_1","unstructured":"Will Eatherton John Williams \"An encoded version of reg-ex database from cisco systems provided for research purposes\".  Will Eatherton John Williams \"An encoded version of reg-ex database from cisco systems provided for research purposes\"."},{"key":"e_1_3_2_1_20_1","unstructured":"TippingPoint X505 www.tippingpoint.com\/products_ips.html  TippingPoint X505 www.tippingpoint.com\/products_ips.html"},{"key":"e_1_3_2_1_21_1","unstructured":"Cisco IOS IPS Deployment Guide www.cisco.com  Cisco IOS IPS Deployment Guide www.cisco.com"},{"key":"e_1_3_2_1_22_1","unstructured":"Tarari RegEx www. tarari.com\/PDF\/RegEx_FACT_SHEET.pdf  Tarari RegEx www. tarari.com\/PDF\/RegEx_FACT_SHEET.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/195613.195663"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1956-0078686-7"},{"key":"e_1_3_2_1_25_1","volume-title":"Lund University","author":"Larsson N.J.","year":"1999","unstructured":"N.J. Larsson , \"Structures of string matching and data compression,\" PhD thesis , Lund University , 1999 . N.J. Larsson, \"Structures of string matching and data compression,\" PhD thesis, Lund University, 1999."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30117-2_33"},{"key":"e_1_3_2_1_28_1","first-page":"125","article-title":"Deep Packet Filter with Dedicated Logic and Read Only Memories","author":"Cho Y. H.","year":"2004","unstructured":"Y. H. Cho , W. H. Mangione-Smith , \" Deep Packet Filter with Dedicated Logic and Read Only Memories ,\" Field Programmable Logic and Applications , Aug. 2004 , pp. 125 -- 134 . Y. H. Cho, W. H. Mangione-Smith, \"Deep Packet Filter with Dedicated Logic and Read Only Memories,\" Field Programmable Logic and Applications, Aug. 2004, pp. 125--134.","journal-title":"Field Programmable Logic and Applications"},{"key":"e_1_3_2_1_29_1","first-page":"404","article-title":"Granidt: Towards Gigabit Rate Network Intrusion Detection Technology","author":"Gokhale M.","year":"2002","unstructured":"M. Gokhale , , \" Granidt: Towards Gigabit Rate Network Intrusion Detection Technology ,\" Field Programmable Logic and Applications , Sept. 2002 , pp. 404 -- 413 . M. Gokhale, et al., \"Granidt: Towards Gigabit Rate Network Intrusion Detection Technology,\" Field Programmable Logic and Applications, Sept. 2002, pp. 404--413.","journal-title":"Field Programmable Logic and Applications"},{"key":"e_1_3_2_1_30_1","unstructured":"J. Levandoski E. Sommer and M. Strait \"Application Layer Packet Classifier for Linux\". http:\/\/l7-filter.sourceforge.net\/.  J. Levandoski E. Sommer and M. Strait \"Application Layer Packet Classifier for Linux\". http:\/\/l7-filter.sourceforge.net\/."},{"key":"e_1_3_2_1_31_1","volume-title":"DineroIV tracedriven uniprocessor cache simulator,\" http:\/\/www.cs.wisc.edu\/markhill\/DineroIV","author":"Hill M.","year":"1998","unstructured":"M. Hill and J. Elder , \" DineroIV tracedriven uniprocessor cache simulator,\" http:\/\/www.cs.wisc.edu\/markhill\/DineroIV , 1998 . M. Hill and J. Elder, \"DineroIV tracedriven uniprocessor cache simulator,\" http:\/\/www.cs.wisc.edu\/markhill\/DineroIV, 1998."},{"key":"e_1_3_2_1_32_1","unstructured":"SafeXcel Content Inspection Engine regex acceleration IP.  SafeXcel Content Inspection Engine regex acceleration IP."},{"key":"e_1_3_2_1_33_1","unstructured":"Network Services Processor OCTEON CN30XX Family.  Network Services Processor OCTEON CN30XX Family."},{"key":"e_1_3_2_1_34_1","volume-title":"et. al, \"Space efficient hash tables with worst case constant access time,\" In STACS","author":"Fotakis D.","year":"2003","unstructured":"D. Fotakis , et. al, \"Space efficient hash tables with worst case constant access time,\" In STACS , 2003 . D. Fotakis, et. al, \"Space efficient hash tables with worst case constant access time,\" In STACS, 2003."}],"event":{"name":"ANCS06: Symposium on Architecture for Networking and Communications Systems","location":"San Jose California USA","acronym":"ANCS06","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1185347.1185359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T09:15:13Z","timestamp":1673082913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185347.1185359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,3]]},"references-count":34,"alternative-id":["10.1145\/1185347.1185359","10.1145\/1185347"],"URL":"https:\/\/doi.org\/10.1145\/1185347.1185359","relation":{},"subject":[],"published":{"date-parts":[[2006,12,3]]},"assertion":[{"value":"2006-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}