{"id":"https://openalex.org/W2049650913","doi":"https://doi.org/10.1109/icsamos.2007.4285750","title":"A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems","display_name":"A Memory-Efficient Reconfigurable Aho-Corasick FSM Implementation for Intrusion Detection Systems","publication_year":2007,"publication_date":"2007-07-01","ids":{"openalex":"https://openalex.org/W2049650913","doi":"https://doi.org/10.1109/icsamos.2007.4285750","mag":"2049650913"},"language":"en","primary_location":{"id":"doi:10.1109/icsamos.2007.4285750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsamos.2007.4285750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012625773","display_name":"Vassilis Dimopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I55741626","display_name":"Technical University of Crete","ror":"https://ror.org/03f8bz564","country_code":"GR","type":"education","lineage":["https://openalex.org/I55741626"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Vassilis Dimopoulos","raw_affiliation_strings":["Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece"],"affiliations":[{"raw_affiliation_string":"Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece","institution_ids":["https://openalex.org/I55741626"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032739499","display_name":"Ioannis Papaefstathiou","orcid":"https://orcid.org/0000-0001-6386-5616"},"institutions":[{"id":"https://openalex.org/I55741626","display_name":"Technical University of Crete","ror":"https://ror.org/03f8bz564","country_code":"GR","type":"education","lineage":["https://openalex.org/I55741626"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ioannis Papaefstathiou","raw_affiliation_strings":["Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece"],"affiliations":[{"raw_affiliation_string":"Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece","institution_ids":["https://openalex.org/I55741626"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045649319","display_name":"Dionisios Pnevmatikatos","orcid":"https://orcid.org/0000-0003-3533-2761"},"institutions":[{"id":"https://openalex.org/I55741626","display_name":"Technical University of Crete","ror":"https://ror.org/03f8bz564","country_code":"GR","type":"education","lineage":["https://openalex.org/I55741626"]},{"id":"https://openalex.org/I4210127348","display_name":"FORTH Institute of Electronic Structure and Laser","ror":"https://ror.org/02a3mhk13","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210127348","https://openalex.org/I8901234"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dionisios Pnevmatikatos","raw_affiliation_strings":["Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece","Institute of Computer Science, HiPEAC, Heraklion, Greece"],"affiliations":[{"raw_affiliation_string":"Electronic and Computer Engineering Department, Technical University of Crete, Chania, Greece","institution_ids":["https://openalex.org/I55741626"]},{"raw_affiliation_string":"Institute of Computer Science, HiPEAC, Heraklion, Greece","institution_ids":["https://openalex.org/I4210127348"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012625773"],"corresponding_institution_ids":["https://openalex.org/I55741626"],"apc_list":null,"apc_paid":null,"fwci":2.2237,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.87624235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"186","last_page":"193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8258950710296631},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7649619579315186},{"id":"https://openalex.org/keywords/string-searching-algorithm","display_name":"String searching algorithm","score":0.6782326698303223},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4958578050136566},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.4700530767440796},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4559129476547241},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4354546070098877},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39724379777908325},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.3778282701969147},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.24375265836715698},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.10606765747070312},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09219443798065186},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07006222009658813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8258950710296631},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7649619579315186},{"id":"https://openalex.org/C7757238","wikidata":"https://www.wikidata.org/wiki/Q374040","display_name":"String searching algorithm","level":3,"score":0.6782326698303223},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4958578050136566},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.4700530767440796},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4559129476547241},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4354546070098877},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39724379777908325},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.3778282701969147},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.24375265836715698},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.10606765747070312},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09219443798065186},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07006222009658813},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icsamos.2007.4285750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsamos.2007.4285750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2007 International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.308.4574","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.308.4574","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://static.googleusercontent.com/external_content/untrusted_dlcp/research.google.com/en/us/pubs/archive/32714.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W124244495","https://openalex.org/W1569514888","https://openalex.org/W1614476484","https://openalex.org/W1674877186","https://openalex.org/W1891233321","https://openalex.org/W1960511147","https://openalex.org/W2030102079","https://openalex.org/W2097030928","https://openalex.org/W2099964107","https://openalex.org/W2100893630","https://openalex.org/W2106062486","https://openalex.org/W2115025779","https://openalex.org/W2118599039","https://openalex.org/W2126870677","https://openalex.org/W2134826720","https://openalex.org/W2141607151","https://openalex.org/W2148462679","https://openalex.org/W2162080541","https://openalex.org/W4247093768","https://openalex.org/W6605045863","https://openalex.org/W6637096788","https://openalex.org/W6677182203","https://openalex.org/W6681757703"],"related_works":["https://openalex.org/W3145288231","https://openalex.org/W2371263218","https://openalex.org/W15130811","https://openalex.org/W2092552144","https://openalex.org/W2354196777","https://openalex.org/W2108265183","https://openalex.org/W2257399947","https://openalex.org/W2207740477","https://openalex.org/W2377397587","https://openalex.org/W2386564085"],"abstract_inverted_index":{"The":[0],"Aho-Corasick":[1],"(AC)":[2],"algorithm":[3,14,62],"is":[4,55],"a":[5,21,56],"very":[6],"flexible":[7],"and":[8],"efficient":[9],"but":[10],"memory-hungry":[11],"pattern":[12],"matching":[13],"that":[15,63],"can":[16],"scan":[17],"the":[18,38,51,60,73,86],"existence":[19],"of":[20,37,59,67],"query":[22],"string":[23],"among":[24],"multiple":[25],"test":[26],"strings":[27],"looking":[28],"at":[29],"each":[30],"character":[31],"exactly":[32],"once,":[33],"making":[34],"it":[35],"one":[36],"main":[39],"options":[40],"for":[41],"software-base":[42],"intrusion":[43,68],"detection":[44,69],"systems":[45],"such":[46],"as":[47],"SNORT.":[48],"We":[49],"present":[50],"Split-AC":[52],"algorithm,":[53],"which":[54],"reconfigurable":[57],"variation":[58],"AC":[61],"exploits":[64],"domain-specific":[65],"characteristics":[66],"to":[70,85],"reduce":[71],"considerably":[72],"FSM":[74],"memory":[75],"requirements.":[76],"SplitAC":[77],"achieves":[78],"an":[79],"overall":[80],"reduction":[81],"between":[82],"28-75%":[83],"compared":[84],"best":[87],"proposed":[88],"implementation.":[89]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":8}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
