{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:09Z","timestamp":1763459289090,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:00:00Z","timestamp":1489708800000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Institute for Critical Technology and Applied Science (ICTAS), an institute dedicated to transformative, interdisciplinary research for a sustainable future (http:\/\/www.ictas.vt.edu)"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1319748"],"award-info":[{"award-number":["CNS-1319748"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,17]]},"DOI":"10.1145\/2881025.2881034","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T11:33:45Z","timestamp":1457955225000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["O3FA"],"prefix":"10.1145","author":[{"given":"Xiaodong","family":"Yu","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Wu-chun","family":"Feng","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Danfeng (Daphne)","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Michela","family":"Becchi","sequence":"additional","affiliation":[{"name":"University of Missouri, Columbia, MO, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.15"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402979"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/574901"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.7"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402983"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544037"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2358840"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263155"},{"key":"e_1_3_2_1_13_1","volume-title":"Measurement and classification of out-of-sequence packets in a tier-1 IP backbone,\" in Proc. of INFO-COM","author":"Sharad J.","year":"2003","unstructured":"J. Sharad, et al., \"Measurement and classification of out-of-sequence packets in a tier-1 IP backbone,\" in Proc. of INFO-COM 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251398.1251403"},{"key":"e_1_3_2_1_15_1","unstructured":"T. Ptacek and T. Newsham \"Insertion Evasion and Denial of Service: Eluding Network Intrusion Detection \" Secure Net-works Inc. Technical Report 1998."},{"key":"e_1_3_2_1_16_1","volume-title":"Method and apparatus for ensuring ATM cell order in multiple cell transmission lane switching system,\" US Patent","author":"Saldinger A. E.","year":"1999","unstructured":"A. E. Saldinger, J. Ding, and S. K. Sathe, \"Method and apparatus for ensuring ATM cell order in multiple cell transmission lane switching system,\" US Patent, 1999."},{"key":"e_1_3_2_1_17_1","volume-title":"Method and apparatus for re-ordering data packets in a network environment,\" US Patent","author":"Chapman A. S. J.","year":"2001","unstructured":"A. S. J. Chapman and H. T. Kung, \"Method and apparatus for re-ordering data packets in a network environment,\" US Patent, 2001."},{"key":"e_1_3_2_1_18_1","volume-title":"Queue engine for reassembling and reordering data packets in a network,\" US Patent","author":"Rana A. V.","year":"2004","unstructured":"A. V. Rana and C. A. Garrow, \"Queue engine for reassembling and reordering data packets in a network,\" US Patent 2004."},{"key":"e_1_3_2_1_19_1","first-page":"393","article-title":"Space-Economical Reassembly for Intrusion Detection System,\" in Information and Communications Security. vol. 2836, ed","author":"Zhang M.","year":"2003","unstructured":"M. Zhang and J.-b. Ju, \"Space-Economical Reassembly for Intrusion Detection System,\" in Information and Communications Security. vol. 2836, ed: Springer Berlin Heidelberg, 2003, pp. 393--404.","journal-title":"Springer Berlin Heidelberg"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.14"},{"key":"e_1_3_2_1_21_1","volume-title":"Monitoring Regular Expressions on Out-of-Order Streams,\" in Proc. of ICDE","author":"Johnson T.","year":"2007","unstructured":"T. Johnson, S. Muthukrishnan, and I. Rozenbaum, \"Monitoring Regular Expressions on Out-of-Order Streams,\" in Proc. of ICDE 2007."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460879"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2309014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159951"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.14"},{"key":"e_1_3_2_1_29_1","volume-title":"A workload for evaluating deep packet inspection architectures,\" in Proc. of IISWC","author":"Becchi M.","year":"2008","unstructured":"M. Becchi, M. Franklin, and P. Crowley, \"A workload for evaluating deep packet inspection architectures,\" in Proc. of IISWC 2008."},{"key":"e_1_3_2_1_30_1","volume-title":"Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns,\" in Proc. of FPL","author":"Clark C. R.","year":"2003","unstructured":"C. R. Clark and D. E. Schimmel, \"Efficient reconfigurable logic circuits for matching complex network intrusion detection patterns,\" in Proc. of FPL 2003."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2482767.2482791"}],"event":{"name":"ANCS '16: Symposium on Architectures for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS"],"location":"Santa Clara California USA","acronym":"ANCS '16"},"container-title":["Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2881025.2881034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2881025.2881034","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2881025.2881034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:42:17Z","timestamp":1763458937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2881025.2881034"}},"subtitle":["A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection"],"short-title":[],"issued":{"date-parts":[[2016,3,17]]},"references-count":31,"alternative-id":["10.1145\/2881025.2881034","10.1145\/2881025"],"URL":"https:\/\/doi.org\/10.1145\/2881025.2881034","relation":{},"subject":[],"published":{"date-parts":[[2016,3,17]]},"assertion":[{"value":"2016-03-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}