{"id":"https://openalex.org/W2073434065","doi":"https://doi.org/10.1145/1323548.1323579","title":"DPICO","display_name":"DPICO","publication_year":2007,"publication_date":"2007-12-03","ids":{"openalex":"https://openalex.org/W2073434065","doi":"https://doi.org/10.1145/1323548.1323579","mag":"2073434065"},"language":"en","primary_location":{"id":"doi:10.1145/1323548.1323579","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1323548.1323579","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110044035","display_name":"Christopher L. Hayes","orcid":null},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher L. Hayes","raw_affiliation_strings":["University of Massachusetts Lowell, Lowell, MA","University of Massachusetts Lowell, Lowell, MA,"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Lowell, Lowell, MA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell, Lowell, MA,","institution_ids":["https://openalex.org/I133738476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003621523","display_name":"Yan Luo","orcid":"https://orcid.org/0000-0002-5301-5092"},"institutions":[{"id":"https://openalex.org/I133738476","display_name":"University of Massachusetts Lowell","ror":"https://ror.org/03hamhx47","country_code":"US","type":"education","lineage":["https://openalex.org/I133738476"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yan Luo","raw_affiliation_strings":["University of Massachusetts Lowell, Lowell, MA","University of Massachusetts Lowell, Lowell, MA,"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts Lowell, Lowell, MA","institution_ids":["https://openalex.org/I133738476"]},{"raw_affiliation_string":"University of Massachusetts Lowell, Lowell, MA,","institution_ids":["https://openalex.org/I133738476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110044035"],"corresponding_institution_ids":["https://openalex.org/I133738476"],"apc_list":null,"apc_paid":null,"fwci":6.3332,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.96440998,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"195","last_page":"203"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.8631116151809692},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.820069432258606},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7347303628921509},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.574974000453949},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5577100515365601},{"id":"https://openalex.org/keywords/finite-state-machine","display_name":"Finite-state machine","score":0.4976840317249298},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.49120160937309265},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.4655962884426117},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45226022601127625},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4396745264530182},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4061979651451111},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.34572136402130127},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31694191694259644},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2308078110218048},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12404978275299072},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10764738917350769}],"concepts":[{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.8631116151809692},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.820069432258606},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7347303628921509},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.574974000453949},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5577100515365601},{"id":"https://openalex.org/C167822520","wikidata":"https://www.wikidata.org/wiki/Q176452","display_name":"Finite-state machine","level":2,"score":0.4976840317249298},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.49120160937309265},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.4655962884426117},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45226022601127625},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4396745264530182},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4061979651451111},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.34572136402130127},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31694191694259644},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2308078110218048},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12404978275299072},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10764738917350769},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1323548.1323579","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1323548.1323579","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1563242287","https://openalex.org/W2003648673","https://openalex.org/W2030102079","https://openalex.org/W2045821558","https://openalex.org/W2080202421","https://openalex.org/W2086923710","https://openalex.org/W2096474000","https://openalex.org/W2099964107","https://openalex.org/W2113422425","https://openalex.org/W2123845384","https://openalex.org/W2124414559","https://openalex.org/W2134826720","https://openalex.org/W2139729124","https://openalex.org/W2149695592","https://openalex.org/W2157196931","https://openalex.org/W2158900125","https://openalex.org/W2160702694","https://openalex.org/W2171527796","https://openalex.org/W2603250181","https://openalex.org/W3011749380","https://openalex.org/W3144157896","https://openalex.org/W4242309756"],"related_works":["https://openalex.org/W1544967040","https://openalex.org/W2594425278","https://openalex.org/W2347338493","https://openalex.org/W2797286879","https://openalex.org/W2037047765","https://openalex.org/W2146932554","https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2900276985","https://openalex.org/W2171331105"],"abstract_inverted_index":{"Deep":[0],"Packet":[1],"Inspection":[2],"(DPI)has":[3],"been":[4],"widely":[5],"adopted":[6],"in":[7],"detecting":[8],"network":[9],"threats":[10],"such":[11],"as":[12],"intrusion,":[13],"viruses":[14],"and":[15,32,95],"spam.":[16],"It":[17],"is":[18,40],"challenging,":[19],"however,":[20],"to":[21,27,75,110,140],"achieve":[22,108],"high":[23],"speed":[24],"DPI":[25,69,136],"due":[26],"the":[28,42,45,50,77,102,130],"expanding":[29],"rule":[30],"sets":[31],"ever":[33],"increasing":[34],"line":[35],"rates.":[36],"A":[37],"key":[38],"issue":[39],"that":[41,71,123],"size":[43],"of":[44,52,105,134],"finite":[46,81],"automata":[47],"falls":[48],"beyond":[49],"capacity":[51],"on-chip":[53],"memory":[54,90,93],"thus":[55],"incurring":[56],"expensive":[57],"off-chip":[58],"accesses.":[59],"In":[60],"this":[61],"paper":[62],"we":[63],"present":[64],"DPICO":[65,106,125],"a":[66,115,124,135],"hardware":[67],"based":[68,126],"engine":[70],"utilizes":[72],"novel":[73],"techniques":[74,84],"minimize":[76],"storage":[78],"requirements":[79],"for":[80],"automata.":[82],"The":[83,98],"proposed":[85],"are":[86],"modified":[87],"content":[88],"addressable":[89],"(mCAM),":[91],"interleaved":[92],"banks,":[94],"data":[96,120],"packing.":[97],"experiment":[99],"results":[100],"show":[101,122],"scalable":[103],"performance":[104,133],"can":[107,128],"up":[109,139],"17.7":[111],"Gbps":[112],"throughput":[113],"using":[114],"contemporary":[116],"FPGA":[117],"chip.":[118],"Experiment":[119],"also":[121],"accelerator":[127],"improve":[129],"pattern":[131],"matching":[132],"server":[137],"by":[138],"10":[141],"times.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
