{"id":"https://openalex.org/W4399775621","doi":"https://doi.org/10.3233/idt-230249","title":"Multi pattern matching algorithm for embedded computer network engineering intrusion detection system","display_name":"Multi pattern matching algorithm for embedded computer network engineering intrusion detection system","publication_year":2024,"publication_date":"2024-06-07","ids":{"openalex":"https://openalex.org/W4399775621","doi":"https://doi.org/10.3233/idt-230249"},"language":"en","primary_location":{"id":"doi:10.3233/idt-230249","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-230249","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103120081","display_name":"Yingying Cai","orcid":"https://orcid.org/0000-0003-3361-6437"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yingying Cai","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5103120081"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3653,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57727201,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"18","issue":"2","first_page":"705","last_page":"716"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7645503282546997},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6628499627113342},{"id":"https://openalex.org/keywords/pattern-matching","display_name":"Pattern matching","score":0.5709789991378784},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5572820901870728},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.47148844599723816},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.42961585521698},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2618780732154846},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19118338823318481},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08847525715827942},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.07270315289497375}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7645503282546997},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6628499627113342},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.5709789991378784},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5572820901870728},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.47148844599723816},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.42961585521698},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2618780732154846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19118338823318481},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08847525715827942},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.07270315289497375},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/idt-230249","is_oa":false,"landing_page_url":"https://doi.org/10.3233/idt-230249","pdf_url":null,"source":{"id":"https://openalex.org/S119727669","display_name":"Intelligent Decision Technologies","issn_l":"1872-4981","issn":["1872-4981","1875-8843"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Decision Technologies","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W2732560875","https://openalex.org/W2734779510","https://openalex.org/W2790115196","https://openalex.org/W2807786182","https://openalex.org/W2890849983","https://openalex.org/W2899372475","https://openalex.org/W2900774199","https://openalex.org/W2902106343","https://openalex.org/W2923817828","https://openalex.org/W2951105308","https://openalex.org/W2958285686","https://openalex.org/W2982702043","https://openalex.org/W3031675477","https://openalex.org/W3106839507","https://openalex.org/W3163260028","https://openalex.org/W3168146198","https://openalex.org/W3170330193","https://openalex.org/W3176065393","https://openalex.org/W3185153696","https://openalex.org/W3201422185","https://openalex.org/W4233164402","https://openalex.org/W6755713928","https://openalex.org/W6756555459","https://openalex.org/W6756599296","https://openalex.org/W6770343162","https://openalex.org/W6773009785"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2133389611","https://openalex.org/W2943461603","https://openalex.org/W2377397587","https://openalex.org/W2386564085","https://openalex.org/W2365153488","https://openalex.org/W3210429500","https://openalex.org/W3217252310","https://openalex.org/W2065828532","https://openalex.org/W4286894112"],"abstract_inverted_index":{"In":[0],"computer":[1,44,52],"networks,":[2],"security":[3,9,42],"issues":[4],"persist,":[5],"and":[6,67,102,126,148,156,174],"addressing":[7],"hidden":[8],"risks":[10],"is":[11,58,115,136,151],"pivotal":[12],"for":[13,28,117],"ensuring":[14],"network":[15,29,45,53,65,179],"security.":[16],"However,":[17],"traditional":[18],"single":[19],"pattern":[20,36,82,133],"matching":[21,37,83,96],"algorithms":[22,38],"like":[23],"BM":[24,103],"(Boyer-Moore)":[25],"lack":[26],"efficiency":[27],"intrusion":[30,47,54,180],"detection.":[31,181],"This":[32],"study":[33,77],"employs":[34],"multiple":[35],"to":[39,63,92],"bolster":[40],"the":[41,89,99,121,132,139,143,165,176],"of":[43,142,178],"engineering":[46],"detection":[48,55],"systems":[49],"(IDS).":[50],"A":[51],"system":[56],"(NIDS)":[57],"designed":[59],"using":[60],"embedded":[61],"technology":[62],"collect":[64],"logs":[66],"other":[68],"pertinent":[69],"data,":[70],"subsequently":[71],"comparing":[72,120],"log":[73],"data":[74,114],"packets.":[75],"The":[76,160],"delves":[78],"into":[79],"a":[80],"multi":[81],"algorithm,":[84,123,125,145,147],"AC":[85,100,122,144],"(Aho-Corasick),":[86],"which":[87],"incorporates":[88],"SUNDAY":[90],"algorithm":[91,101,104,150,167],"optimize":[93],"unnecessary":[94],"string":[95,134],"jumps.":[97],"Furthermore,":[98],"are":[105],"fused":[106],"as":[107],"control":[108],"methods.":[109],"Randomly":[110],"generated":[111],"48M":[112],"text":[113],"utilized":[116],"testing":[118],"purposes,":[119],"AC-BM":[124,146],"AC-SUNDAY":[127,149,166],"algorithm.":[128],"For":[129],"instance,":[130],"when":[131],"length":[135],"20":[137],"bytes,":[138],"memory":[140,172],"consumption":[141,173],"12.2":[152],"MB,":[153,155],"9.8":[154],"6.2":[157],"MB":[158],"respectively.":[159],"findings":[161],"indicate":[162],"that":[163],"applying":[164],"in":[168],"NIDS":[169],"effectively":[170],"reduces":[171],"enhances":[175],"efficacy":[177]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
