1. 1. Smyth, B. (2003), Computing Patterns in Strings, Pearson Addison Wesley.
2. 2. Hilhurt, S.Ya. (2014), "Application of FPGA-based reconfigurable accelerators for network security tasks", Simulation and informational technologies PIMEE NAS of Ukraine, Vol. 73, pp. 17-26.
3. 3. Evdokimov, V.F., Davydenko, A.N. and Hilgurt, S.Ya. (2018), "Synthesis of reconfigurable information security hardware on HPC platforms", Ukrainian information security research journal, Vol. 20, no. 4, pp. 247-258.
4. 4. Hilhurt, S.Ya. (2018), "The use of reconfigurable accelerator for speed-up of signaturebased information security systems", Simulation-2018, Ukraine, Kyiv, PMEE NAS of Ukraine, pp. 107-110.
5. 5. Teuvo, K. (1987), Content-Addressable Memories, Berlin , Germany.