{"id":"https://openalex.org/W1512979674","doi":"https://doi.org/10.1007/11663812_6","title":"Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card","display_name":"Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W1512979674","doi":"https://doi.org/10.1007/11663812_6","mag":"1512979674"},"language":"en","primary_location":{"id":"doi:10.1007/11663812_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11663812_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029566823","display_name":"Herbert Bos","orcid":"https://orcid.org/0000-0001-6179-1510"},"institutions":[{"id":"https://openalex.org/I865915315","display_name":"Vrije Universiteit Amsterdam","ror":"https://ror.org/008xxew50","country_code":"NL","type":"education","lineage":["https://openalex.org/I865915315"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"H. Bos","raw_affiliation_strings":["Vrije Universiteit, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Vrije Universiteit, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I865915315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072113393","display_name":"Kaiming Huang","orcid":"https://orcid.org/0000-0003-3665-2687"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiming Huang","raw_affiliation_strings":["Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029566823"],"corresponding_institution_ids":["https://openalex.org/I865915315"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.9018,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.98040247,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"102","last_page":"123"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112638592720032},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.742374837398529},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.6887383460998535},{"id":"https://openalex.org/keywords/ethernet","display_name":"Ethernet","score":0.6810120344161987},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.613142192363739},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6102533936500549},{"id":"https://openalex.org/keywords/host-based-intrusion-detection-system","display_name":"Host-based intrusion detection system","score":0.6050137281417847},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5388445854187012},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5336699485778809},{"id":"https://openalex.org/keywords/network-processor","display_name":"Network processor","score":0.5035027861595154},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4867837131023407},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4855353832244873},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45111018419265747},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4122452139854431},{"id":"https://openalex.org/keywords/network-interface-controller","display_name":"Network interface controller","score":0.41186076402664185},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3419356346130371},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25853654742240906},{"id":"https://openalex.org/keywords/intrusion-prevention-system","display_name":"Intrusion prevention system","score":0.22929444909095764}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112638592720032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.742374837398529},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.6887383460998535},{"id":"https://openalex.org/C172173386","wikidata":"https://www.wikidata.org/wiki/Q79984","display_name":"Ethernet","level":2,"score":0.6810120344161987},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.613142192363739},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6102533936500549},{"id":"https://openalex.org/C90936777","wikidata":"https://www.wikidata.org/wiki/Q917189","display_name":"Host-based intrusion detection system","level":4,"score":0.6050137281417847},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5388445854187012},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5336699485778809},{"id":"https://openalex.org/C74366991","wikidata":"https://www.wikidata.org/wiki/Q2755335","display_name":"Network processor","level":3,"score":0.5035027861595154},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4867837131023407},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4855353832244873},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45111018419265747},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4122452139854431},{"id":"https://openalex.org/C171659815","wikidata":"https://www.wikidata.org/wiki/Q165233","display_name":"Network interface controller","level":2,"score":0.41186076402664185},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3419356346130371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25853654742240906},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.22929444909095764},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/11663812_6","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11663812_6","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:research.vu.nl:publications/4ae3ba6c-dd0f-4500-b1db-40c8af8468ec","is_oa":false,"landing_page_url":"http://www.scopus.com/inward/citedby.url?scp=33745643365&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306400546","display_name":"Digital Academic REpository of VU University Amsterdam (Vrije Universiteit Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I865915315","host_organization_name":"Vrije Universiteit Amsterdam","host_organization_lineage":["https://openalex.org/I865915315"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bos, H & Huang, K 2006, Towards software-based signature detection for intrusion prevention on the network card. in Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers. vol. 3858 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3858 LNCS, pp. 102-123, 8th International Symposium on Recent Advances in Intrusion Detection, RAID 2005, Seattle, WA, United States, 7/09/05. https://doi.org/10.1007/11663812_6","raw_type":"contributionToPeriodical"},{"id":"pmh:vu:oai:research.vu.nl:publications/4ae3ba6c-dd0f-4500-b1db-40c8af8468ec","is_oa":false,"landing_page_url":"https://research.vu.nl/en/publications/4ae3ba6c-dd0f-4500-b1db-40c8af8468ec","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers, 3858 LNCS, 102 - 123","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W132371169","https://openalex.org/W154335262","https://openalex.org/W1490025813","https://openalex.org/W1511700591","https://openalex.org/W1516506771","https://openalex.org/W1553177637","https://openalex.org/W1585768841","https://openalex.org/W1674877186","https://openalex.org/W1744212210","https://openalex.org/W1994212840","https://openalex.org/W2096030967","https://openalex.org/W2098366185","https://openalex.org/W2099964107","https://openalex.org/W2102481563","https://openalex.org/W2105045498","https://openalex.org/W2105340125","https://openalex.org/W2105557138","https://openalex.org/W2112135709","https://openalex.org/W2121511513","https://openalex.org/W2131963831","https://openalex.org/W2134006599","https://openalex.org/W2134684274","https://openalex.org/W2166975838","https://openalex.org/W2171030986","https://openalex.org/W2172024521","https://openalex.org/W2491391797","https://openalex.org/W4246524285"],"related_works":["https://openalex.org/W2348394835","https://openalex.org/W2349717303","https://openalex.org/W3147199753","https://openalex.org/W1542776537","https://openalex.org/W2396569093","https://openalex.org/W4387914975","https://openalex.org/W2304621773","https://openalex.org/W2393176933","https://openalex.org/W2380349012","https://openalex.org/W155276412"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
