{"id":"https://openalex.org/W1965456293","doi":"https://doi.org/10.1145/1980022.1980300","title":"FPGA based approach for signature based antivirus applications","display_name":"FPGA based approach for signature based antivirus applications","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W1965456293","doi":"https://doi.org/10.1145/1980022.1980300","mag":"1965456293"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980300","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040479136","display_name":"Nitesh Guinde","orcid":null},"institutions":[{"id":"https://openalex.org/I118118575","display_name":"New Jersey Institute of Technology","ror":"https://ror.org/05e74xb87","country_code":"US","type":"education","lineage":["https://openalex.org/I118118575"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"N. B. Guinde","raw_affiliation_strings":["[New Jersey Institute of Technology, Newark, NJ]"],"affiliations":[{"raw_affiliation_string":"[New Jersey Institute of Technology, Newark, NJ]","institution_ids":["https://openalex.org/I118118575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074622629","display_name":"R. B. Lohani","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112052","display_name":"Indian Institute of Technology Goa","ror":"https://ror.org/02v7trd43","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210112052"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. B. Lohani","raw_affiliation_strings":["Goa College of Engineering, Farmagudi, Goa"],"affiliations":[{"raw_affiliation_string":"Goa College of Engineering, Farmagudi, Goa","institution_ids":["https://openalex.org/I4210112052"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040479136"],"corresponding_institution_ids":["https://openalex.org/I118118575"],"apc_list":null,"apc_paid":null,"fwci":0.2519,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.52295504,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1262","last_page":"1262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799271821975708},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7786139845848083},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.7726302146911621},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5902420878410339},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.563431441783905},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5505216717720032},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5476518869400024},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5308977961540222},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5296216607093811},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.47309306263923645},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4302275478839874},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.4295431673526764},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4282483458518982},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3616093397140503},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32131630182266235},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26637423038482666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1897309124469757},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1490633487701416},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1395002007484436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799271821975708},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7786139845848083},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.7726302146911621},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5902420878410339},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.563431441783905},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5505216717720032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5476518869400024},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5308977961540222},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5296216607093811},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.47309306263923645},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4302275478839874},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.4295431673526764},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4282483458518982},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3616093397140503},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32131630182266235},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26637423038482666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1897309124469757},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1490633487701416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1395002007484436},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980300","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980300","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1707172707","https://openalex.org/W1976716770","https://openalex.org/W2029721861","https://openalex.org/W2123069001","https://openalex.org/W2158900125"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1557094818","https://openalex.org/W1764168690","https://openalex.org/W1975357770","https://openalex.org/W2160606508","https://openalex.org/W2377397587","https://openalex.org/W2386564085","https://openalex.org/W2365153488","https://openalex.org/W2065828532"],"abstract_inverted_index":{"The":[0],"detection":[1,12,42],"of":[2,9,54,59,73,100,124],"malicious":[3],"files":[4],"is":[5,43,142],"an":[6,47],"important":[7,48],"component":[8],"any":[10],"intrusion":[11],"system.":[13],"Due":[14],"to":[15,30,45,79,147,158],"increase":[16],"in":[17,50,67,85,128],"network":[18],"speeds":[19],"and":[20,57,111,126],"new":[21],"worms":[22,32],"being":[23],"discovered":[24],"frequently,":[25],"there":[26],"arises":[27],"a":[28,119,138,145],"need":[29],"detect":[31],"on":[33],"the":[34,64,68,71,76,81,163],"fly":[35],"without":[36],"disassembling":[37],"or":[38],"running":[39],"them.":[40],"Signature-based":[41],"considered":[44],"be":[46,156,166],"technique":[49],"anti-virus":[51],"applications":[52,103],"because":[53],"its":[55],"accuracy":[56],"lack":[58],"false":[60],"positives.":[61],"by":[62,108],"checking":[63],"signatures":[65,74],"stored":[66],"database.":[69],"As":[70],"database":[72],"increase,":[75],"time":[77],"required":[78],"perform":[80,159],"pattern":[82,101],"matching":[83,102,161],"operation":[84],"software":[86],"increases.":[87],"FPGAs(Field":[88],"Programmable":[89],"Gate":[90],"Arrays)":[91],"present":[92,137],"us":[93],"with":[94,150],"ideal":[95],"platforms":[96],"for":[97,168],"these":[98],"kinds":[99],"since":[104],"they":[105],"are":[106],"characterized":[107],"low":[109],"cost":[110],"short":[112],"application":[113],"development":[114],"cycles.":[115],"They":[116,153],"also":[117,155],"provide":[118],"right":[120],"compromise":[121],"between":[122],"flexibility":[123],"re-programming":[125],"capability":[127],"operating":[129],"at":[130],"high":[131],"speeds.":[132],"In":[133],"this":[134],"paper":[135],"we":[136],"design":[139],"where":[140,162],"FPGA":[141],"used":[143],"as":[144],"co-processor":[146],"help":[148],"out":[149],"signature":[151],"matching.":[152],"can":[154,165],"extended":[157],"inline":[160],"packets":[164],"inspected":[167],"protocol":[169],"analysis.":[170]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
