{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:06Z","timestamp":1738777206895,"version":"3.37.0"},"reference-count":14,"publisher":"Academy Publisher","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.8.5.1191-1196","type":"journal-article","created":{"date-parts":[[2013,5,31]],"date-time":"2013-05-31T05:17:01Z","timestamp":1369977421000},"source":"Crossref","is-referenced-by-count":2,"title":["Analysis and Improvement of AC-BM Algorithm in Intrusion Detection System"],"prefix":"10.4304","volume":"8","author":[{"given":"Zhengcai","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhengyi","family":"Tang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2013,5,30]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781316135228","volume-title":"Flexible Pattern Matching in Strings","author":"Navaro","year":"2002","unstructured":"[1] GRM Navaro, Flexible Pattern Matching in Strings, Cambridge University Press, 2002."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/69.219740"},{"issue":"1","key":"ref4","first-page":"27","article-title":"Improvement of AC-BM Algorithm and its Application in Intrusion Test [J]","volume":"28","author":"Siwei","year":"2007","unstructured":"[5] Zhou Siwei, Cai Yong, \"Improvement of AC-BM Algorithm and its Application in Intrusion Test [J]\", Microcomputer Applications, 2007,28(1):27-31.","journal-title":"Microcomputer Applications"},{"issue":"4","key":"ref5","first-page":"531","article-title":"Improved AC-BM Character String Matching Algorithm [J]","volume":"35","author":"Guogen","year":"2006","unstructured":"[6] Wang Guogen, Qin Zhiguang, \"Improved AC-BM Character String Matching Algorithm [J]\", Journal of University of Electronic Science and Technology of China, 2006,35(4):531-534.","journal-title":"Journal of University of Electronic Science and Technology of China"},{"issue":"4","key":"ref6","first-page":"98","article-title":"Pattern Matching Algorithm and its Optimization [J]","volume":"25","author":"Yafeng","year":"2011","unstructured":"[7] Yao Yafeng, Jiang Yi, \"Pattern Matching Algorithm and its Optimization [J]\", Journal of Nantong Vocational College, 2011,25(4):98-100.","journal-title":"Journal of Nantong Vocational College"},{"issue":"no. 2","key":"ref7","first-page":"216","article-title":"Research and improvement of AC-BM algorithm","volume":"3","author":"Hou","year":"2011","unstructured":"[8] Zhengfeng Hou, Xiaole Zhang, \"Research and improvement of AC-BM algorithm\", Chinese Journal of Scientific Instrument, vol. 3, no. 2, pp. 216-221, 2011.","journal-title":"Chinese Journal of Scientific Instrument"},{"issue":"3","key":"ref8","first-page":"222","article-title":"Two-way AC Algorithm and its Application in IDS","volume":"20","author":"Chao","year":"2011","unstructured":"[10] Yang Chao, \"Two-way AC Algorithm and its Application in IDS\", Computer Applications, 2011, 20(3): 222-225.","journal-title":"Computer Applications"},{"key":"ref8","unstructured":"[2] Roesch M., Green C., Snort users manual, https:\/\/www.Snort.org."},{"key":"ref8","unstructured":"[9] Peifei Wu, \"The research and amelioration of pattern-matching algorithm in intrusion detection system\", In Proceedings of the 14th IEEE International Conference on High Performance Computing and Communications (HPCC-2012), pp. 1712-1715, 2012."},{"key":"ref8","unstructured":"[11] Huang Hai, \"Research on the Universal Concurrency Technology of Character String Matching Algorithm\", Xi'an University of architecture and Technology, 2010."},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[12] Changsheng Miao, Guiran Chang, Xingwei Wang, \"Filtering Based Multiple String Matching Algorithm Combining q-Grams and BNDM\", In Proceedings of the 2010 Fourth International Conference on Genetic and Evolutionary Computing, ACM, pp.582-585, 2010.","DOI":"10.1109\/ICGEC.2010.149"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[13] Weizhe Zhang, Yuanjing Zhang, Hongli Zhang, Xuemai Gu, \"A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap\", In Proceedings of the 2009 Fourth International Conference on Internet Computing for Science and Engineering, ACM, pp. 1-5, 2009.","DOI":"10.1109\/ICICSE.2009.37"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"[14] Xinming Chen, Kailin Ge, Zhen Chen, \"AC-Suffix-Tree: Buffer Free String Matching on Out-of-Sequence Packets\", In Proceedings of the 2011 ACM\/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, PP. 36-44, 2011.","DOI":"10.1109\/ANCS.2011.14"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:01:58Z","timestamp":1738774918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,30]]},"references-count":14,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2013,5,30]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.8.5.1191-1196","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2013,5,30]]}}}