1. 1 H. Chen, Y. Chen, and D. H. Summerville, "A Survey on the Application of FPGAs for Network Infrastructure Security," IEEE Communications Surveys and Tutorials, Article vol. 13, no. 4, pp. 541-561, 2011, doi: 10.1109/surv.2011.072210.00075.
2. 2 S. Y. Hilhurt, "Application of FPGA-based reconfigurable accelerators for network security tasks," Modeling and information technologies. Collection of scientific works of PIMEE NAS of Ukraine, no. 73, pp. 17-26, 2014.
3. 3 V. Paxson et al., "Rethinking hardware support for network analysis and intrusion prevention," presented at the USENIX First Workshop on Hot Topics in Security (HotSec), Vancouver, July 31, 2006.
4. 4 B. Smyth, Computing Patterns in Strings. Essex: Pearson Addison Wesley, 2003.
5. 5 H. R. Lewis and C. H. Papadimitriou, Elements of the Theory of the Computations, 2nd ed. Prentice-Hall, 1998.