{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T11:40:34Z","timestamp":1717587634781},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"4","license":[{"start":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T00:00:00Z","timestamp":1412726400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"},{"start":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T00:00:00Z","timestamp":1412726400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Intrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research. It presents a review about the evolution of intrusion detection systems with usage of general purpose computing on graphics processing units (GPGPU). There are many detection techniques but only some of them bring advantages of parallel computing implementation to graphical processors (GPU). The most common technique transformed into GPU is the technique of pattern matching. There is a number of intrusion detection tools using GPU tested in real network traffic.<\/jats:p>","DOI":"10.2478\/s13537-014-0213-6","type":"journal-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T05:44:58Z","timestamp":1412660698000},"page":"222-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Survey of parallel intrusion detection on graphical processors"],"prefix":"10.2478","volume":"4","author":[{"given":"Liberios","family":"Vokorokos","sequence":"first","affiliation":[{"name":"Dept. of Computers and Informatics, Technical University in Ko\u0161ice, Letn\u00e1 9, Ko\u0161ice, 042 00, Slovakia"}]},{"given":"Michal","family":"Ennert","sequence":"additional","affiliation":[{"name":"Dept. of Computers and Informatics, Technical University in Ko\u0161ice, Letn\u00e1 9, Ko\u0161ice, 042 00, Slovakia"}]},{"given":"Marek","family":">\u010cajkovsk\u00fd","sequence":"additional","affiliation":[{"name":"Dept. of Computers and Informatics, Technical University in Ko\u0161ice, Letn\u00e1 9, Ko\u0161ice, 042 00, Slovakia"}]},{"given":"J\u00e1n","family":"Radu\u0161ovsk\u00fd","sequence":"additional","affiliation":[{"name":"Dept. of Computers and Informatics, Technical University in Ko\u0161ice, Letn\u00e1 9, Ko\u0161ice, 042 00, Slovakia"}]}],"member":"374","published-online":{"date-parts":[[2014,10,8]]},"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.2478\/s13537-014-0213-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.2478\/s13537-014-0213-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-014-0213-6\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-014-0213-6\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T10:46:33Z","timestamp":1717584393000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-014-0213-6\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,8]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,10,8]]},"published-print":{"date-parts":[[2014,12,1]]}},"alternative-id":["10.2478\/s13537-014-0213-6"],"URL":"https:\/\/doi.org\/10.2478\/s13537-014-0213-6","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,8]]}}}