{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363388846192525056.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/jsac.2006.877131"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx5/49/35995/01705611.pdf?arnumber=1705611"}}],"dc:title":[{"@value":"Fast and Scalable Pattern Matching for Network Intrusion Detection Systems"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383388846192525056","@type":"Researcher","foaf:name":[{"@value":"S. Dharmapurikar"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388846192525057","@type":"Researcher","foaf:name":[{"@value":"J.W. Lockwood"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"07338716"}],"prism:publicationName":[{"@value":"IEEE Journal on Selected Areas in Communications"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2006-10","prism:volume":"24","prism:number":"10","prism:startingPage":"1781","prism:endingPage":"1792"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx5/49/35995/01705611.pdf?arnumber=1705611"}],"createdAt":"2006-10-12","modifiedAt":"2021-11-29","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1390001205214209024","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A fast and scalable string matching algorithm using contents correction signature hashing for network IDS"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282679349279360","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Implementing Signature Based IDS in IP-Based Sensor Networks with the Help of Signature-Codes"}]},{"@id":"https://cir.nii.ac.jp/crid/1390282679354369152","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Parallel DFA Architecture for Ultra High Throughput DFA-Based Pattern Matching"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/jsac.2006.877131"},{"@type":"CROSSREF","@value":"10.1587/elex.5.949_references_DOI_KoRksheSbywHHnqYG4AgF8OtYtL"},{"@type":"CROSSREF","@value":"10.1587/transcom.e93.b.389_references_DOI_KoRksheSbywHHnqYG4AgF8OtYtL"},{"@type":"CROSSREF","@value":"10.1587/transinf.e93.d.3232_references_DOI_KoRksheSbywHHnqYG4AgF8OtYtL"}]}