{"id":"https://openalex.org/W4319993447","doi":"https://doi.org/10.1587/transfun.2022eap1062","title":"Dual Cuckoo Filter with a Low False Positive Rate for Deep Packet Inspection","display_name":"Dual Cuckoo Filter with a Low False Positive Rate for Deep Packet Inspection","publication_year":2023,"publication_date":"2023-01-25","ids":{"openalex":"https://openalex.org/W4319993447","doi":"https://doi.org/10.1587/transfun.2022eap1062"},"language":"en","primary_location":{"id":"doi:10.1587/transfun.2022eap1062","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2022eap1062","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E106.A/8/E106.A_2022EAP1062/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.jstage.jst.go.jp/article/transfun/E106.A/8/E106.A_2022EAP1062/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067293259","display_name":"Yixuan ZHANG","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yixuan ZHANG","raw_affiliation_strings":["College of Cyberspace, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"College of Cyberspace, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015654748","display_name":"Meiting Xue","orcid":"https://orcid.org/0000-0001-5207-0965"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meiting XUE","raw_affiliation_strings":["College of Cyberspace, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"College of Cyberspace, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086866207","display_name":"Huan Zhang","orcid":"https://orcid.org/0000-0003-3315-763X"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huan ZHANG","raw_affiliation_strings":["College of Communication Engineering, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"College of Communication Engineering, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017197153","display_name":"Shubiao LIU","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shubiao LIU","raw_affiliation_strings":["Department of Instrument of Engineering, Zhejiang University"],"affiliations":[{"raw_affiliation_string":"Department of Instrument of Engineering, Zhejiang University","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103054164","display_name":"Bei Zhao","orcid":"https://orcid.org/0000-0002-7245-9924"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bei ZHAO","raw_affiliation_strings":["College of Computer, Hangzhou Dianzi University"],"affiliations":[{"raw_affiliation_string":"College of Computer, Hangzhou Dianzi University","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067293259"],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.4012,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.57707382,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"E106.A","issue":"8","first_page":"1037","last_page":"1042"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cuckoo","display_name":"Cuckoo","score":0.7450264096260071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7305262684822083},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.6849095821380615},{"id":"https://openalex.org/keywords/cuckoo-search","display_name":"Cuckoo search","score":0.6782445311546326},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6568057537078857},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.6506071090698242},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6045172214508057},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.44315794110298157},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4275360703468323},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3858242630958557},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36111652851104736},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.20064452290534973},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.173519104719162},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.08220908045768738},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.05777609348297119}],"concepts":[{"id":"https://openalex.org/C2776810535","wikidata":"https://www.wikidata.org/wiki/Q26381","display_name":"Cuckoo","level":2,"score":0.7450264096260071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7305262684822083},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.6849095821380615},{"id":"https://openalex.org/C117241572","wikidata":"https://www.wikidata.org/wiki/Q5192379","display_name":"Cuckoo search","level":3,"score":0.6782445311546326},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6568057537078857},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.6506071090698242},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6045172214508057},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.44315794110298157},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4275360703468323},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3858242630958557},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36111652851104736},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.20064452290534973},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.173519104719162},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.08220908045768738},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.05777609348297119},{"id":"https://openalex.org/C90856448","wikidata":"https://www.wikidata.org/wiki/Q431","display_name":"Zoology","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transfun.2022eap1062","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2022eap1062","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E106.A/8/E106.A_2022EAP1062/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transfun.2022eap1062","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1587/transfun.2022eap1062","pdf_url":"https://www.jstage.jst.go.jp/article/transfun/E106.A/8/E106.A_2022EAP1062/_pdf","source":{"id":"https://openalex.org/S166990724","display_name":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences","issn_l":"0916-8508","issn":["0916-8508","1745-1337"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4319993447.pdf"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1967373117","https://openalex.org/W2060079256","https://openalex.org/W2112404667","https://openalex.org/W2115775347","https://openalex.org/W2116435146","https://openalex.org/W2123845384","https://openalex.org/W2515835885","https://openalex.org/W2734832476","https://openalex.org/W2751288069","https://openalex.org/W2792538953","https://openalex.org/W2963947431","https://openalex.org/W3088677962"],"related_works":["https://openalex.org/W4293402493","https://openalex.org/W2337808039","https://openalex.org/W2963570310","https://openalex.org/W2963947431","https://openalex.org/W4294295976","https://openalex.org/W2982465022","https://openalex.org/W2210675186","https://openalex.org/W3090524281","https://openalex.org/W2789677890","https://openalex.org/W4285327229"],"abstract_inverted_index":{"Network":[0],"traffic":[1,29],"control":[2],"and":[3,24,31,141,158,163],"classification":[4],"have":[5],"become":[6],"increasingly":[7],"dependent":[8],"on":[9,37,65],"deep":[10],"packet":[11],"inspection":[12],"(DPI)":[13],"approaches,":[14],"which":[15],"are":[16],"the":[17,27,75,102,105,117,139,161],"most":[18],"precise":[19],"techniques":[20,39],"for":[21],"intrusion":[22],"detection":[23],"prevention.":[25],"However,":[26],"increasing":[28],"volumes":[30],"link":[32],"speed":[33],"exert":[34],"considerable":[35],"pressure":[36],"DPI":[38,148],"to":[40,74,92,116,126,156],"process":[41],"packets":[42],"with":[43,107],"high":[44],"performance":[45],"in":[46,121,146,151],"restricted":[47],"available":[48],"memory.":[49,110],"To":[50],"overcome":[51],"this":[52],"problem,":[53],"we":[54],"proposed":[55,84],"dual":[56],"cuckoo":[57,66],"filter":[58,67,131],"(DCF)":[59],"as":[60,127,143],"a":[61,122,147],"data":[62,85,123],"structure":[63,86,124],"based":[64],"(CF).":[68],"The":[69,83,99,133],"CF":[70,106,162],"can":[71,113],"be":[72,114],"extended":[73,115],"parallel":[76,79,118,128],"mode":[77],"called":[78],"Cuckoo":[80,130],"Filter":[81],"(PCF).":[82],"employs":[87],"an":[88],"extra":[89],"hash":[90],"function":[91],"obtain":[93],"two":[94],"potential":[95],"indices":[96],"of":[97,104,154],"entries.":[98],"DCF":[100,140],"magnifies":[101],"superiority":[103],"no":[108],"additional":[109],"Moreover,":[111],"it":[112],"mode,":[119],"resulting":[120],"referred":[125],"Dual":[129],"(PDCF).":[132],"implementation":[134],"results":[135,150],"show":[136],"that":[137],"using":[138],"PDCF":[142],"identification":[144],"tools":[145],"system":[149],"time":[152],"improvements":[153],"up":[155],"2%":[157],"30%":[159],"over":[160],"PCF,":[164],"respectively.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-01-25T23:04:38.658462","created_date":"2025-10-10T00:00:00"}
