-
1
-
-
34248344089
-
Parallel construction of a suffix tree with applications
-
A. Apostolico, C. Iliopoulos, G.M. Landau, B. Schieber, and U. Vishkin. Parallel construction of a suffix tree with applications, Algorithmica, 1988.
-
(1988)
Algorithmica
-
-
Apostolico, A.1
Iliopoulos, C.2
Landau, G.M.3
Schieber, B.4
Vishkin, U.5
-
3
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In Proc. ACM SIGCOMM, 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
5
-
-
0001532207
-
Color set size problem with applications to string matching
-
L. Hui. Color set size problem with applications to string matching. In Proc. Symp. Comb. Pattern Matching, 1992.
-
(1992)
Proc. Symp. Comb. Pattern Matching
-
-
Hui, L.1
-
6
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.A. Kim and B. Karp. Autograph: toward automated, distributed worm signature detection. In Proc. USENIX Security Symp., 2004.
-
(2004)
Proc. USENIX Security Symp
-
-
Kim, H.A.1
Karp, B.2
-
9
-
-
0016942292
-
A space-economical suffix tree construction algorithm
-
E.M. McCreight. A space-economical suffix tree construction algorithm. In Journal of the ACM, 23(2):262-272, 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.2
, pp. 262-272
-
-
McCreight, E.M.1
-
12
-
-
0003676885
-
Fingerprinting by random polynomials
-
Technical Report TR-15-81, Harvard University
-
M.O. Rabin. Fingerprinting by random polynomials, Technical Report TR-15-81, Harvard University, 1981.
-
(1981)
-
-
Rabin, M.O.1
-
13
-
-
44049107617
-
The strength of syntax based approaches to dynamic network intrusion detection
-
Princeton, NJ, Mar
-
W. Scheirer and M. Chuah. The strength of syntax based approaches to dynamic network intrusion detection. In Proc. Conf. on Info. Sci. & Sys., Princeton, NJ, Mar. 2006.
-
(2006)
Proc. Conf. on Info. Sci. & Sys
-
-
Scheirer, W.1
Chuah, M.2
-
15
-
-
34248371093
-
-
Waikato Applied Network Dynamics Research Group, data traces
-
Waikato Applied Network Dynamics Research Group. Auckland University data traces. http://wand.cs.waikato.ac.nz/wand/wits/.
-
Auckland University
-
-
-
16
-
-
34248387180
-
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification
-
To appear in
-
J. Wang, D.J. Miller, and G. Kesidis. Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. To appear in IEEE JSAC on High-Speed Network Security, 2005.
-
(2005)
IEEE JSAC on High-Speed Network Security
-
-
Wang, J.1
Miller, D.J.2
Kesidis, G.3
-
18
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z. Zhang and S. Bhattacharyya. Profiling internet backbone traffic: behavior models and applications. In Proc. ACM SIGCOMM, 2005.
-
(2005)
Proc. ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
19
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In Proc. Internet Meas. Conf., 2004.
-
(2004)
Proc. Internet Meas. Conf
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|