{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:45:27Z","timestamp":1755801927825,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650650","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"1490-1494","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on intrusion detection based on Boyer-Moore pattern matching algorithm"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7893-306X","authenticated-orcid":false,"given":"Yulong","family":"Li","sequence":"first","affiliation":[{"name":"Cybersecurity Academy, Changchun University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9202-6685","authenticated-orcid":false,"given":"Chenhao","family":"Li","sequence":"additional","affiliation":[{"name":"Cybersecurity Academy, Changchun University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4283-0088","authenticated-orcid":false,"given":"Yang","family":"Jiao","sequence":"additional","affiliation":[{"name":"Changchun sixth middle school, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7703-0076","authenticated-orcid":false,"given":"Guogang","family":"Zhao","sequence":"additional","affiliation":[{"name":"Jilin provincial transport scientific research instiina, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9048-8178","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Chongqing Public Security Bureau, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9111-2612","authenticated-orcid":false,"given":"Tian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chongqing Public Security Bureau, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection[J]","volume":"2023","author":"Winfred Y","year":"2023","unstructured":"Winfred Y, Charity M Y B, Ebenezer O. 2023. Estimating Overhead Performance of Supervised Machine Learning Algorithms for Intrusion Detection[J]. International Journal of Information Technologies and Systems Approach (IJITSA) 2023,16(1).","journal-title":"International Journal of Information Technologies and Systems Approach (IJITSA)"},{"key":"e_1_3_2_1_2_1","article-title":"Modeling an intrusion detection using recurrent neural networks[J]","volume":"2023","author":"Mariam I","year":"2023","unstructured":"Mariam I, Ruba E. 2023. Modeling an intrusion detection using recurrent neural networks[J]. Journal of Engineering Research 2023, 11(1).","journal-title":"Journal of Engineering Research"},{"key":"e_1_3_2_1_3_1","article-title":"WEB INTRUSION DETECTION SYSTEM: IDENTIFICATION OF WEB SERVER RELIABILITY ON INTERNET CONNECTIONS THROUGH LOG FILE PREPROCESSING[J]","volume":"2020","author":"Ponmaniraj S","year":"2020","unstructured":"Ponmaniraj S, Kumar T D, Goel K A D. 2020. WEB INTRUSION DETECTION SYSTEM: IDENTIFICATION OF WEB SERVER RELIABILITY ON INTERNET CONNECTIONS THROUGH LOG FILE PREPROCESSING[J]. Journal of Critical Reviews 2020,7(18).","journal-title":"Journal of Critical Reviews"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Charu G Kumar R S Kumar A M. GeneMiner. 2022. A Classification Approach for Detection of XSS Attacks on Web Services[J]. Computational Intelligence and Neuroscience.","DOI":"10.1155\/2022\/3675821"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Rong C. 2022 Design and Protection Strategy of Distributed Intrusion Detection System in Big Data Environment[J]. Computational Intelligence and Neuroscience.","DOI":"10.1155\/2022\/4720169"},{"key":"e_1_3_2_1_6_1","article-title":"Developing a faster pattern matching algorithms for intrusion detection system[J]","volume":"2019","author":"Obeidat I","year":"2019","unstructured":"Obeidat I, AlZubi M. 2019. Developing a faster pattern matching algorithms for intrusion detection system[J]. International Journal of Computing, 2019, 18(3) 278-284.","journal-title":"International Journal of Computing"},{"key":"e_1_3_2_1_7_1","article-title":"A systematic review of detection and prevention techniques of SQL injection attacks[J]","volume":"2023","author":"Mohammed N","year":"2023","unstructured":"Mohammed N, Ashaar A, Malik Q, 2023. A systematic review of detection and prevention techniques of SQL injection attacks[J]. Information Security Journal: A Global Perspective, 2023,32(4).","journal-title":"Information Security Journal: A Global Perspective"},{"key":"e_1_3_2_1_8_1","volume-title":"Application of Improved BM Algorithm in String Approximate Matching[J]. Procedia Computer Science","author":"Duan Y","year":"2020","unstructured":"Duan Y, Long H,Qu Q Y. 2020. Application of Improved BM Algorithm in String Approximate Matching[J]. Procedia Computer Science 2020,166(C)."},{"key":"e_1_3_2_1_9_1","article-title":"A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems[J]","volume":"2020","author":"Masdari M","year":"2020","unstructured":"Masdari M, Khezri H. 2020. A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems[J]. Applied Soft Computing Journal, 2020,92(prepublish).","journal-title":"Applied Soft Computing Journal"},{"key":"e_1_3_2_1_10_1","article-title":"Plague of cross-site scripting on web applications: a review, taxonomy and challenges[J]","volume":"2018","author":"Chaudhary P","year":"2018","unstructured":"Chaudhary P, Gupta B. 2018. Plague of cross-site scripting on web applications: a review, taxonomy and challenges[J]. Int. J. of Web Based Communities 2018,14(1).","journal-title":"Int. J. of Web Based Communities"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/308\/1\/012016"}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:06:03Z","timestamp":1755752763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650650"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":11,"alternative-id":["10.1145\/3650400.3650650","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650650","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}