{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T15:36:30Z","timestamp":1720280190519},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1016\/j.comcom.2015.02.004","type":"journal-article","created":{"date-parts":[[2015,2,21]],"date-time":"2015-02-21T19:30:17Z","timestamp":1424547017000},"page":"47-58","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"C","title":["Algorithms to speedup pattern matching for network intrusion detection systems"],"prefix":"10.1016","volume":"62","author":[{"given":"Kai","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhijun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baohua","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2015.02.004_b0005","unstructured":"2005 FBI Computer Crime Survey.