{"id":"https://openalex.org/W2137683786","doi":"https://doi.org/10.1109/aina.2003.1192870","title":"New string matching technology for network security","display_name":"New string matching technology for network security","publication_year":2003,"publication_date":"2003-12-22","ids":{"openalex":"https://openalex.org/W2137683786","doi":"https://doi.org/10.1109/aina.2003.1192870","mag":"2137683786"},"language":"en","primary_location":{"id":"doi:10.1109/aina.2003.1192870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101593746","display_name":"Yuebin Bai","orcid":"https://orcid.org/0000-0002-3201-1156"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]},{"id":"https://openalex.org/I104946051","display_name":"Nihon University","ror":"https://ror.org/05jk51a88","country_code":"JP","type":"education","lineage":["https://openalex.org/I104946051"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Yuebin Bai","raw_affiliation_strings":["Beihang University, China","Nihon University, Japan"],"affiliations":[{"raw_affiliation_string":"Beihang University, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"Nihon University, Japan","institution_ids":["https://openalex.org/I104946051"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005824874","display_name":"Hiroki Kobayashi","orcid":"https://orcid.org/0000-0002-9674-0374"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"H. Kobayashi","raw_affiliation_strings":["Beihang University, China"],"affiliations":[{"raw_affiliation_string":"Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101593746"],"corresponding_institution_ids":["https://openalex.org/I104946051","https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.7082,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.7784445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"198","last_page":"201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997094392776489},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.7417023181915283},{"id":"https://openalex.org/keywords/commentz-walter-algorithm","display_name":"Commentz-Walter algorithm","score":0.6441608667373657},{"id":"https://openalex.org/keywords/boyer\u2013moore-string-search-algorithm","display_name":"Boyer\u2013Moore string search algorithm","score":0.6325036287307739},{"id":"https://openalex.org/keywords/approximate-string-matching","display_name":"Approximate string matching","score":0.6043213605880737},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5729192495346069},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5708519220352173},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4704301059246063},{"id":"https://openalex.org/keywords/string-metric","display_name":"String metric","score":0.4603128135204315},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.43606942892074585},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38599538803100586},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2855769991874695},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14120694994926453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997094392776489},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.7417023181915283},{"id":"https://openalex.org/C13052355","wikidata":"https://www.wikidata.org/wiki/Q5152399","display_name":"Commentz-Walter algorithm","level":4,"score":0.6441608667373657},{"id":"https://openalex.org/C80701825","wikidata":"https://www.wikidata.org/wiki/Q895984","display_name":"Boyer\u2013Moore string search algorithm","level":5,"score":0.6325036287307739},{"id":"https://openalex.org/C32610155","wikidata":"https://www.wikidata.org/wiki/Q1798621","display_name":"Approximate string matching","level":3,"score":0.6043213605880737},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5729192495346069},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5708519220352173},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4704301059246063},{"id":"https://openalex.org/C22820288","wikidata":"https://www.wikidata.org/wiki/Q9050568","display_name":"String metric","level":4,"score":0.4603128135204315},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.43606942892074585},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38599538803100586},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2855769991874695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14120694994926453},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/aina.2003.1192870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aina.2003.1192870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1507645144","https://openalex.org/W1516506771","https://openalex.org/W3021187106","https://openalex.org/W6630612570","https://openalex.org/W6630856255"],"related_works":["https://openalex.org/W2054173104","https://openalex.org/W2051764263","https://openalex.org/W2069035364","https://openalex.org/W2519145296","https://openalex.org/W2111239386","https://openalex.org/W2187092961","https://openalex.org/W2590193441","https://openalex.org/W2358632292","https://openalex.org/W2141423589","https://openalex.org/W3145288231"],"abstract_inverted_index":{"String":[0],"matching":[1,21,55,80,99],"is":[2,48,70,101,108,121,132,146,194],"a":[3,44,63,91,96,143],"comprehensive":[4],"applicable":[5],"key":[6],"technology":[7],"beyond":[8],"intrusion":[9],"detection":[10],"systems":[11],"(IDS),":[12],"and":[13,76,164,193,209,212,215],"many":[14],"areas":[15],"can":[16,24],"benefit":[17],"from":[18],"faster":[19,75],"string":[20,54,79,98],"algorithm.":[22,126],"Which":[23],"be":[25,170],"used":[26],"in":[27,66,82,103,110,129,172],"IDS,":[28],"firewall":[29],"et":[30],"al":[31],"network":[32,45],"security":[33],"applications.":[34,175],"These":[35,167],"applications":[36,60],"are":[37,138,181],"usually":[38],"deployed":[39],"at":[40],"choke":[41],"points":[42],"of":[43,93,124,153,178],"where":[46],"there":[47],"heavily":[49],"traffic.":[50],"Using":[51,140],"lower":[52],"efficient":[53,78],"algorithm":[56,100,107,114,120,159,180,189,202,208],"may":[57],"make":[58,157],"these":[59,141,174],"to":[61,73,84,160],"become":[62],"performance":[64,163,205],"bottleneck":[65],"network.":[67],"So":[68],"it":[69],"very":[71],"necessary":[72],"develop":[74],"more":[77,165,213],"algorithms":[81],"order":[83],"overcome":[85],"the":[86,151,158,179,201],"troubles":[87],"on":[88,150],"performance.":[89],"On":[90],"basis":[92],"Boyer-Moore-Horspool":[94,125,210],"algorithm,":[95,211],"new":[97,113],"presented":[102],"this":[104],"paper.":[105],"The":[106,112,119,188,196],"described":[109],"detail.":[111],"has":[115,203],"been":[116],"greatly":[117],"improved.":[118],"one":[122],"simplification":[123],"Array":[127],"NEXT":[128,145],"Preprocessing":[130],"stage":[131],"redesigned.":[133],"A":[134],"novel":[135],"generated":[136],"rules":[137],"presented.":[139],"rules,":[142],"simple":[144,214],"generated.":[147],"And":[148],"based":[149],"concept":[152],"reference":[154],"point,":[155],"all":[156,173],"have":[161],"better":[162,204],"efficient.":[166,216],"characteristics":[168],"will":[169],"useful":[171],"Main":[176],"features":[177],"presented,":[182],"then":[183],"explained":[184],"its":[185],"work":[186],"processes.":[187],"also":[190],"passed":[191],"test":[192,197],"validated.":[195],"results":[198],"show":[199],"that":[200],"than":[206],"Boyer-Moore":[207]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
