{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:38:12Z","timestamp":1762429092345},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,12,3]]},"DOI":"10.1145\/1185347.1185372","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"183-192","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Packet pre-filtering for network intrusion detection"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Sourdis","sequence":"first","affiliation":[{"name":"TU Delft, The Netherlands"}]},{"given":"Vasilis","family":"Dimopoulos","sequence":"additional","affiliation":[{"name":"Technical University of Crete, Crete, Greece"}]},{"given":"Dionisios","family":"Pnevmatikatos","sequence":"additional","affiliation":[{"name":"Technical University of Crete, Crete, Greece and Institute of Computer Science (ICS), Crete, Greece"}]},{"given":"Stamatis","family":"Vassiliadis","sequence":"additional","affiliation":[{"name":"TU Delft, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2006,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Piranha: Fast and memory-efficient pattern matching for intrusion detection.In Proceedings 20th IFIP International Information Security Conference (SEC 2005)","author":"Antonatos S.","year":"2005","unstructured":"S. Antonatos , M. Polychronakis , P. Akritidis , K. D. Anagnostakis , and E. P. Markatos . Piranha: Fast and memory-efficient pattern matching for intrusion detection.In Proceedings 20th IFIP International Information Security Conference (SEC 2005) May 2005 . S. Antonatos, M. Polychronakis, P. Akritidis, K. D. Anagnostakis, and E. P. Markatos. Piranha: Fast and memory-efficient pattern matching for intrusion detection.In Proceedings 20th IFIP International Information Security Conference (SEC 2005) May 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025123.1025823"},{"volume-title":"Regular Expression Matching for Reconfigurable Packet Inspection. In IEEE International Conference on Field Programmable Technology (FPT)2006","author":"Bispo J.","key":"e_1_3_2_1_3_1","unstructured":"J. Bispo , I. Sourdis , J. M. Cardoso , and S. Vassiliadis . Regular Expression Matching for Reconfigurable Packet Inspection. In IEEE International Conference on Field Programmable Technology (FPT)2006 . J. Bispo, I. Sourdis, J. M. Cardoso, and S. Vassiliadis. Regular Expression Matching for Reconfigurable Packet Inspection. In IEEE International Conference on Field Programmable Technology (FPT)2006."},{"key":"e_1_3_2_1_4_1","volume-title":"Scalable Parallel Pattern-Matching on High-Speed Networks. In IEEE Symposium on Field-Programmable Custom Computing Machines","author":"Clark C. R.","year":"2004","unstructured":"C. R. Clark and D. E. Schimmel . Scalable Parallel Pattern-Matching on High-Speed Networks. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2004 . C. R. Clark and D. E. Schimmel. Scalable Parallel Pattern-Matching on High-Speed Networks. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11573036_63"},{"key":"e_1_3_2_1_7_1","volume-title":"Assisting Network Intrusion Detection with Reconfigurable Hardware. In IEEE Symposium on Field-Programmable Custom Computing Machines","author":"Franklin R.","year":"2002","unstructured":"R. Franklin , D. Carver , and B. Hutchings . Assisting Network Intrusion Detection with Reconfigurable Hardware. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2002 . R. Franklin, D. Carver, and B. Hutchings. Assisting Network Intrusion Detection with Reconfigurable Hardware. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2002."},{"key":"e_1_3_2_1_8_1","first-page":"146","volume-title":"Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN)","author":"Markatos E.","year":"2002","unstructured":"E. Markatos , S. Antonatos , M. Polyhronakis , and K. G. Anagnostakis . Exclusion-based signature matching for intrusion detection . In Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN) pages 146 -- 152 , November 2002 . E. Markatos, S. Antonatos, M. Polyhronakis, and K. G. Anagnostakis. Exclusion-based signature matching for intrusion detection. In Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN) pages 146--152, November 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/938383.938394"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of 15th International Conference on Field Programmable Logic and Applications","author":"Papadopoulos G.","year":"2005","unstructured":"G. Papadopoulos and D. Pnevmatikatos . Hashing + Memory =Low Cost, Exact Pattern Matching . In Proceedings of 15th International Conference on Field Programmable Logic and Applications 2005 . G. Papadopoulos and D. Pnevmatikatos. Hashing + Memory =Low Cost, Exact Pattern Matching. In Proceedings of 15th International Conference on Field Programmable Logic and Applications 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1058426.1058885"},{"key":"e_1_3_2_1_12_1","unstructured":"SNORT official web site.http:\/\/www.snort.org.  SNORT official web site.http:\/\/www.snort.org."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1046192.1046223"},{"volume-title":"Snort rule optimizer. In www.sourcefire.com\/whitepapers\/sf snort20 ruleop.pdf","year":"2002","key":"e_1_3_2_1_14_1","unstructured":"Sourcefire. Snort rule optimizer. In www.sourcefire.com\/whitepapers\/sf snort20 ruleop.pdf June 2002 . Sourcefire. Snort rule optimizer. In www.sourcefire.com\/whitepapers\/sf snort20 ruleop.pdf June 2002."},{"key":"e_1_3_2_1_15_1","volume-title":"Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. In IEEE Symposium on Field-Programmable Custom Computing Machines","author":"Sourdis I.","year":"2004","unstructured":"I. Sourdis and D. Pnevmatikatos . Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2004 . I. Sourdis and D. Pnevmatikatos. Pre-decoded CAMs for Efficient and High-Speed NIDS Pattern Matching. In IEEE Symposium on Field-Programmable Custom Computing Machines April 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2005.1515804"},{"key":"e_1_3_2_1_17_1","unstructured":"The Shmoo Group: the Capture the Flag Data. http:\/\/cctf.shmoo.com\/.  The Shmoo Group: the Capture the Flag Data. http:\/\/cctf.shmoo.com\/."}],"event":{"name":"ANCS06: Symposium on Architecture for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"San Jose California USA","acronym":"ANCS06"},"container-title":["Proceedings of the 2006 ACM\/IEEE symposium on Architecture for networking and communications systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1185347.1185372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T14:16:31Z","timestamp":1673100991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1185347.1185372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,3]]},"references-count":16,"alternative-id":["10.1145\/1185347.1185372","10.1145\/1185347"],"URL":"https:\/\/doi.org\/10.1145\/1185347.1185372","relation":{},"subject":[],"published":{"date-parts":[[2006,12,3]]},"assertion":[{"value":"2006-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}