{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:53:36Z","timestamp":1776880416262,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,12,3]]},"DOI":"10.1145\/1185347.1185360","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"93-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":339,"title":["Fast and memory-efficient regular expression matching for deep packet inspection"],"prefix":"10.1145","author":[{"given":"Fang","family":"Yu","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"Zhifeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Google Inc."}]},{"given":"Yanlei","family":"Diao","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst"}]},{"given":"T. V.","family":"Lakshman","sequence":"additional","affiliation":[{"name":"Bell Laboratories, Lucent Technologies"}]},{"given":"Randy H.","family":"Katz","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2006,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"J. Levandoski E. Sommer and M. Strait \"Application Layer Packet Classifier for Linux.\" http:\/\/l7-filter.sourceforge.net\/.  J. Levandoski E. Sommer and M. Strait \"Application Layer Packet Classifier for Linux.\" http:\/\/l7-filter.sourceforge.net\/."},{"key":"e_1_3_2_1_2_1","unstructured":"\"SNORT Network Intrusion Detection System.\" http:\/\/www.snort.org.  \"SNORT Network Intrusion Detection System.\" http:\/\/www.snort.org."},{"key":"e_1_3_2_1_3_1","unstructured":"\"Bro Intrusion Detection System.\" http:\/\/bro-ids.org\/Overview.html.  \"Bro Intrusion Detection System.\" http:\/\/bro-ids.org\/Overview.html."},{"key":"e_1_3_2_1_4_1","volume-title":"LISA","author":"Tan L.","year":"2005","unstructured":"L. Tan and T. Sherwood , \" A High Throughput String Matching Architecture for Intrusion Detection and Prevention,\" Proc . LISA , 2005 . L. Tan and T. Sherwood, \"A High Throughput String Matching Architecture for Intrusion Detection and Prevention,\" Proc. LISA, 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"FCCM","author":"Cho Y.","year":"2004","unstructured":"Y. Cho and W. Mangione-Smith , \" Deep packet filter with dedicated logic and read only memories,\" Proc . FCCM , 2004 . Y. Cho and W. Mangione-Smith, \"Deep packet filter with dedicated logic and read only memories,\" Proc. FCCM, 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968312"},{"key":"e_1_3_2_1_7_1","volume-title":"FCCM","author":"Baker Z. K.","year":"2004","unstructured":"Z. K. Baker and V. K. Prasanna , \" A methodology for synthesis of efficient intrusion detection systems on FPGAs.,\" Proc . FCCM , 2004 . Z. K. Baker and V. K. Prasanna, \"A methodology for synthesis of efficient intrusion detection systems on FPGAs.,\" Proc. FCCM, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055626.1055640"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"key":"e_1_3_2_1_10_1","volume-title":"ICNP","author":"Yu F.","year":"2004","unstructured":"F. Yu , R. H. Katz , and T. V. Lakshman , \" Gigabit Rate Packet Pattern Matching with TCAM,\" Proc . ICNP , 2004 . F. Yu, R. H. Katz, and T. V. Lakshman, \"Gigabit Rate Packet Pattern Matching with TCAM,\" Proc. ICNP, 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065641"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1042046.1042051"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/958942.958947"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/557657"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"e_1_3_2_1_16_1","volume-title":"FCCM","author":"Moscola J.","year":"2003","unstructured":"J. Moscola , J. Lockwood , R. P. Loui , and Michael Pachos , \" Implementation of a Content-Scanning Module for an Internet Firewall,\" Proc . FCCM , 2003 . J. Moscola, J. Lockwood, R. P. Loui, and Michael Pachos, \"Implementation of a Content-Scanning Module for an Internet Firewall,\" Proc. FCCM, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1058426.1058885"},{"key":"e_1_3_2_1_18_1","volume-title":"FCCM","author":"Franklin R.","year":"2002","unstructured":"R. Franklin , D. Carver , and B. Hutchings , \" Assisting network intrusion detection with reconfigurable hardware,\" Proc . FCCM , 2002 . R. Franklin, D. Carver, and B. Hutchings, \"Assisting network intrusion detection with reconfigurable hardware,\" Proc. FCCM, 2002."},{"key":"e_1_3_2_1_19_1","volume-title":"Scalable pattern matching for high speed networks,\" Proc FCCM","author":"Clark C. R.","year":"2004","unstructured":"C. R. Clark and D. E. Schimmel , \" Scalable pattern matching for high speed networks,\" Proc FCCM , 2004 . C. R. Clark and D. E. Schimmel, \"Scalable pattern matching for high speed networks,\" Proc FCCM, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_21_1","unstructured":"\"Standard for Information Technology Portable Operating System Interface (POSIX) \" Portable Applications Standards Committee of IEEE Computer Society and the Open Group.  \"Standard for Information Technology Portable Operating System Interface (POSIX) \" Portable Applications Standards Committee of IEEE Computer Society and the Open Group."},{"key":"e_1_3_2_1_23_1","first-page":"2005","volume":"49","author":"Kahle J. A.","unstructured":"J. A. Kahle , M. N. Day , H. P. Hofstee , C. R. Johns , T. R. Maeurer , and D. Shippy , \"Introduction to the Cell multiprocessor,\" IBM J. RES. & DEV. , vol. 49 , JULY\/SEPTEMBER 2005 . J. A. Kahle, M. N. Day, H. P. Hofstee, C. R. Johns, T. R. Maeurer, and D. Shippy, \"Introduction to the Cell multiprocessor,\" IBM J. RES. & DEV., vol. 49, JULY\/SEPTEMBER 2005.","journal-title":"\"Introduction to the Cell multiprocessor,\" IBM J. RES. & DEV."},{"key":"e_1_3_2_1_24_1","unstructured":"\"MIT DARPA Intrusion Detection Data Sets.\" http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html.  \"MIT DARPA Intrusion Detection Data Sets.\" http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html."},{"key":"e_1_3_2_1_25_1","unstructured":"V. Paxson et al. \"Flex: A fast scanner generator.\" http:\/\/www.gnu.org\/software\/flex\/.  V. Paxson et al. \"Flex: A fast scanner generator.\" http:\/\/www.gnu.org\/software\/flex\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Perl compatible Regular Expression http:\/\/www.pcre.org\/  Perl compatible Regular Expression http:\/\/www.pcre.org\/"},{"key":"e_1_3_2_1_27_1","volume-title":"May","author":"Yu F.","year":"2006","unstructured":"F. Yu , Z. Chen , Y. Diao , T. V. Lakshman and R. H. Katz ,, \" Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection,\" UC Berkeley technical report , May 2006 . F. Yu, Z. Chen, Y. Diao, T. V. Lakshman and R. H. Katz,, \"Fast and Memory-Efficient Regular Expression Matching for Deep Packet Inspection,\" UC Berkeley technical report, May 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.7"}],"event":{"name":"ANCS06: Symposium on Architecture for Networking and Communications Systems","location":"San Jose California USA","acronym":"ANCS06","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1185347.1185360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T14:15:19Z","timestamp":1673100919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185347.1185360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,3]]},"references-count":27,"alternative-id":["10.1145\/1185347.1185360","10.1145\/1185347"],"URL":"https:\/\/doi.org\/10.1145\/1185347.1185360","relation":{},"subject":[],"published":{"date-parts":[[2006,12,3]]},"assertion":[{"value":"2006-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}