{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T22:43:43Z","timestamp":1769467423541,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T00:00:00Z","timestamp":1224633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst Sign Image Video Technol"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s11265-008-0279-2","type":"journal-article","created":{"date-parts":[[2008,10,21]],"date-time":"2008-10-21T20:38:05Z","timestamp":1224621485000},"page":"85-93","source":"Crossref","is-referenced-by-count":3,"title":["Variable Length Pattern Matching for Hardware Network Intrusion Detection System"],"prefix":"10.1007","volume":"59","author":[{"given":"Chun Jason","family":"Xue","sequence":"first","affiliation":[]},{"given":"Meilin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"QingFeng","family":"Zhuge","sequence":"additional","affiliation":[]},{"given":"Edwin Hsing-Mean","family":"Sha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,10,22]]},"reference":[{"key":"279_CR1","unstructured":"Sourcefire (2003). Snort: The open source network intrusion detection system. Columbia: Sourcefire."},{"key":"279_CR2","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1145\/359842.359859","volume":"20","author":"R. S. Boyer","year":"1977","unstructured":"Boyer R. S., & Moore J. S. (1977). A fast string searching algorithm. Communications of the ACM, 20, 762\u2013772.","journal-title":"Communications of the ACM"},{"key":"279_CR3","unstructured":"Anagnostakis, K. G., Antonatos, S., Markatos, E. P., & Polychronakis, M. (2003). E2xb: A domain-specific string matching algorithm for intrusion detection. In Proceedings of the 18th IFIP international security conference(SEC2003)."},{"key":"279_CR4","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"V. A. Aho","year":"1975","unstructured":"Aho, V. A., & Corasick, M. J. (1975). Efficient string matching: An aid to bibliographic search. Communications of the ACM, 18, 333\u2013340.","journal-title":"Communications of the ACM"},{"key":"279_CR5","volume-title":"Technical report CS2001-0670 (updated version)","author":"M. Fisk","year":"2002","unstructured":"Fisk, M., & Varghese, G. (2002). An analysis of fast string matching applied to content-based forwarding and intrusion detection. In Technical report CS2001-0670 (updated version). San Diego: University of California."},{"key":"279_CR6","unstructured":"Norton, M., & Roelker, D. (2002). Snort 2.0: Detection revised. https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.sourcefire.com\/ ."},{"key":"279_CR7","doi-asserted-by":"crossref","unstructured":"Fisk, M., & Varghese, G. (2004). Applying fast string matching to intrusion detection. Technical Report CS2001-0670, UCSD","DOI":"10.21236\/ADA406266"},{"key":"279_CR8","doi-asserted-by":"crossref","unstructured":"Tuck, N., Sherwood, T., Calder, B., & Varghese, G. (2004). Deterministic memory-efficient string matching algorithms for intrusion detection. In Proceedings of the 23rd conference of the IEEE communications society (Infocomm), March.","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"279_CR9","doi-asserted-by":"crossref","unstructured":"Aldwairi, M., Conte, T., & Franzon, P. (2005). Configurable string matching hardware for speeding up intrusion detection. In Workshop on architecture support for security and anti-virus (pp. 99\u2013107).","DOI":"10.1145\/1055626.1055640"},{"key":"279_CR10","doi-asserted-by":"crossref","unstructured":"Baker, Z. K. (2004). Time and area efficient pattern matching on fpgas. In Proceedings of the 2004 ACM\/SIGDA 12th international symposium on field programmable gate arrays (pp. 223\u2013232).","DOI":"10.1145\/968280.968312"},{"key":"279_CR11","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1137\/0206024","volume":"6","author":"D. E. Knuth","year":"1977","unstructured":"Knuth, D. E., Morris, J., & Pratt, V. R. (1977). Fast pattern matching in string. SIAM Journal on Computing, 6, 323\u2013350.","journal-title":"SIAM Journal on Computing"},{"key":"279_CR12","unstructured":"Li, S., Torresen, J., & Soraasen, O. (2003). Exploiting reconfigurable hardware for network security. In Proceedings of the 11th IEEE symposium on field-programmable custom computing machines."},{"key":"279_CR13","volume-title":"Automatic rule clustering for improved, signature based intrusion detection","author":"C. Kruegel","year":"2002","unstructured":"Kruegel, C., et al. (2002). Automatic rule clustering for improved, signature based intrusion detection. Santa Barbara: University of California."},{"key":"279_CR14","doi-asserted-by":"crossref","unstructured":"Tan, L., & Sherwood, T. (2005). A high throughput string matching architecture for intrusion detection and prevention. In Proceedings of the 32nd annual international symposium on computer architecture (pp. 112\u2013122).","DOI":"10.1145\/1080695.1069981"},{"key":"279_CR15","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1145\/1015047.1015055","volume":"3","author":"R.-T. Liu","year":"2004","unstructured":"Liu, R.-T., Huang, N.-F., Chen, C.-H., & Kao, C.-N. (2004). A fast string-matching algorithm for nerwork processor-based intrusion detection system. ACM Transactions on Embedded Computing Systems, 3, 614\u2013633","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"279_CR16","doi-asserted-by":"crossref","unstructured":"Dharmapurikar, S., Krishnamurthy, P., Sproull, T. & Lockwood, J. (2003). Deep packet inspection using parallel bloom filters. In Proceedings of HotL.","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"279_CR17","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. H. Bloom","year":"1970","unstructured":"Bloom, B. H. (1970). Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13, 422\u2013426.","journal-title":"Communications of the ACM"},{"key":"279_CR18","unstructured":"Song, H., & Lockwood, J. (2005). Multi-pattern signature matching for hardware network intrusion detection systems. In Proceedings of IEEE GLOBECOM 2005."},{"key":"279_CR19","unstructured":"Ramakrishna, M., Fu, E., & Bahcekapili, E. (1994) A performance study of hashing functions for hardware applications. In Proceedings of internal conference on computing and information (pp. 1621\u20131636)."},{"key":"279_CR20","unstructured":"Gokhake, M., Dubois, D., Dubois, A., Boorman, M., Poole, S., & Hogsett, V. (2002). Towards gigabit rate network intrusion detection. In Proceeding of FPL2002."},{"key":"279_CR21","unstructured":"Moscola, J., Lockwood, J., Loui, R. P., & Pachos, M. (2003). Implementation of a content-scanning module for an interenet firewall. In Proceeding of FCCM 2003."},{"key":"279_CR22","doi-asserted-by":"crossref","unstructured":"Cho, Y. H., Navab, S., & Mangione-Smith, W. H. (2002). Specialized hardware for deep network packet filtering. In Proceeding of FPL 2002: 12th international conference on field-programmable logic and applications, Sept.","DOI":"10.1007\/3-540-46117-5_48"},{"key":"279_CR23","unstructured":"Xilinx, Inc. (2004). Virtex-II Pro and virtex-II Pro X platform FPGAs: Complete data sheet. San Jose: Xilinx."}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11265-008-0279-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/article\/10.1007\/s11265-008-0279-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/s11265-008-0279-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T12:19:29Z","timestamp":1559391569000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/s11265-008-0279-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,22]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["279"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/s11265-008-0279-2","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10,22]]}}}