-
1
-
-
84950138443
-
Assisting network intrusion detection with configurable hardware
-
B. L. Hutchings, R. Franklin, and D. Carver, "Assisting network intrusion detection with configurable hardware," in Proc. IEEE Symp. Field-Program. Custom Comput. Mach., 2002, pp. 111-120.
-
(2002)
Proc. IEEE Symp. Field-Program. Custom Comput. Mach
, pp. 111-120
-
-
Hutchings, B.L.1
Franklin, R.2
Carver, D.3
-
2
-
-
33746897662
-
Specialized hardware for deep network packet filtering
-
Y. H. Cho, S. Navab, and W. Mangione-Smith, "Specialized hardware for deep network packet filtering," in Proc. 12th Int. Conf. Field Program. Logic Appl., 2002, pp. 452-461.
-
(2002)
Proc. 12th Int. Conf. Field Program. Logic Appl
, pp. 452-461
-
-
Cho, Y.H.1
Navab, S.2
Mangione-Smith, W.3
-
3
-
-
79955152559
-
Granidt: Towards gigabit rate network intrusion detection technology
-
M. Gokhale, D. Dubois, A. Dubois, M. Boorman, S. Poole, and V. Hogsett, "Granidt: Towards gigabit rate network intrusion detection technology," in Proc. Int. Conf. Field Program. Logic Appl., 2002, pp. 404-413.
-
(2002)
Proc. Int. Conf. Field Program. Logic Appl
, pp. 404-413
-
-
Gokhale, M.1
Dubois, D.2
Dubois, A.3
Boorman, M.4
Poole, S.5
Hogsett, V.6
-
4
-
-
33845525241
-
Fast, large-scale string match for a 10 Gbps FPGA-based network intrusion detection system
-
I. Sourdis and D. Pnevmatikatos, "Fast, large-scale string match for a 10 Gbps FPGA-based network intrusion detection system," in Proc. Int. Conf. Field Program. Logic Appl., 2003, pp. 880-889.
-
(2003)
Proc. Int. Conf. Field Program. Logic Appl
, pp. 880-889
-
-
Sourdis, I.1
Pnevmatikatos, D.2
-
10
-
-
18644368071
-
Implementation results of bloom filters for string matching
-
M. Attig, S. Dharmapurikar, and J. Lockwood, "Implementation results of bloom filters for string matching," in Proc. IEEE Symp. Field-Program. Custom Comput. Mach., 2004, pp. 322-323.
-
(2004)
Proc. IEEE Symp. Field-Program. Custom Comput. Mach
, pp. 322-323
-
-
Attig, M.1
Dharmapurikar, S.2
Lockwood, J.3
-
11
-
-
38349121030
-
-
Y. H. Cho and W. H. Mangione-Smith, Programmable hardware for deep packet filtering on a large signature set, in Proc. Conf. Interaction Between Arch., Circuits, Compilers(P = ac2), 2004.
-
Y. H. Cho and W. H. Mangione-Smith, "Programmable hardware for deep packet filtering on a large signature set," in Proc. Conf. Interaction Between Arch., Circuits, Compilers(P = ac2), 2004.
-
-
-
-
12
-
-
27544490145
-
A high throughput string matching architecture for intrusion detection and prevention
-
L. Tan and T. Sherwood, "A high throughput string matching architecture for intrusion detection and prevention," in Proc. 32nd Int. Symp. Comput. Arch. (ISCA), 2005, pp. 112-122.
-
(2005)
Proc. 32nd Int. Symp. Comput. Arch. (ISCA)
, pp. 112-122
-
-
Tan, L.1
Sherwood, T.2
-
13
-
-
11244355264
-
Biosequence similarity search on the mercury system
-
P. Krishnamurthy, J. Buhler, R. D. Chamberlain, M. A. Franklin, K. Gyang, and J. Lancaster, "Biosequence similarity search on the mercury system," in Proc. 15th IEEE Int. Conf. Appl.-Specific Syst., Arch., Processors (ASAP), 2004, pp. 365-375.
-
(2004)
Proc. 15th IEEE Int. Conf. Appl.-Specific Syst., Arch., Processors (ASAP)
, pp. 365-375
-
-
Krishnamurthy, P.1
Buhler, J.2
Chamberlain, R.D.3
Franklin, M.A.4
Gyang, K.5
Lancaster, J.6
-
14
-
-
33751403504
-
FPGA based architecture for DNA sequence comparison and database search
-
presented at the, Rodos, Greece
-
E. Sotiriadis, C. Kozanitis, and A. Dollas, "FPGA based architecture for DNA sequence comparison and database search," presented at the 13th Reconfigurable Arch. Workshop (RAW), Rodos, Greece, 2006.
-
(2006)
13th Reconfigurable Arch. Workshop (RAW)
-
-
Sotiriadis, E.1
Kozanitis, C.2
Dollas, A.3
-
15
-
-
38349155489
-
-
SNORT, Online, Available
-
SNORT, "SNORT official website," 2007. [Online], Available: http://www.snort.org
-
(2007)
SNORT official website
-
-
-
17
-
-
2642555499
-
Performance analysis of content matching intrusion detection systems
-
S. Antonatos, K. G. Anagnostakis, E. P. Markatos, and M. Polychronakis, "Performance analysis of content matching intrusion detection systems," in Proc. Int. Symp. Appl. Internet, 2004, pp. 208-218.
-
(2004)
Proc. Int. Symp. Appl. Internet
, pp. 208-218
-
-
Antonatos, S.1
Anagnostakis, K.G.2
Markatos, E.P.3
Polychronakis, M.4
-
19
-
-
33746933463
-
A reconfigurable perfect-hashing scheme for packet inspection
-
I. Sourdis, D. Pnevmatikatos, S. Wong, and S. Vassiliadis, "A reconfigurable perfect-hashing scheme for packet inspection," in Proc. 15th Int. Conf. Field Program. Logic Appl., 2005, pp. 644-647.
-
(2005)
Proc. 15th Int. Conf. Field Program. Logic Appl
, pp. 644-647
-
-
Sourdis, I.1
Pnevmatikatos, D.2
Wong, S.3
Vassiliadis, S.4
-
20
-
-
33751512659
-
Automatic synthesis of efficient intrusion detection systems on FPGAs
-
Oct
-
Z. K. Baker and V. K. Prasanna, "Automatic synthesis of efficient intrusion detection systems on FPGAs," IEEE Trans. Dependable Sec. Comput., vol. 3, no. 4, pp. 289-300, Oct. 2006.
-
(2006)
IEEE Trans. Dependable Sec. Comput
, vol.3
, Issue.4
, pp. 289-300
-
-
Baker, Z.K.1
Prasanna, V.K.2
-
21
-
-
33746154556
-
A signature match processor architecture for network intrusion detection
-
J. Singaraju, L. Bu, and J. A. Chandy, "A signature match processor architecture for network intrusion detection," in Proc. IEEE Symp. Field-Program. Custom Comput. Mach., 2005, pp. 235-242.
-
(2005)
Proc. IEEE Symp. Field-Program. Custom Comput. Mach
, pp. 235-242
-
-
Singaraju, J.1
Bu, L.2
Chandy, J.A.3
-
22
-
-
33645793950
-
Implementation of a content-scanning module for an internet firewall
-
J. Moscola, J. Lockwood, R. P. Loui, and M. Pachos, "Implementation of a content-scanning module for an internet firewall," in Proc. IEEE Symp. Field-Program. Custom Comput. Mach., 2003, pp. 31-38.
-
(2003)
Proc. IEEE Symp. Field-Program. Custom Comput. Mach
, pp. 31-38
-
-
Moscola, J.1
Lockwood, J.2
Loui, R.P.3
Pachos, M.4
-
23
-
-
1842478680
-
Deep packet inspection using parallel Bloom, filters
-
Jan
-
S. Dharmapurikar, P. Krishnamurthy, T. S. Sproull, and J. W. Lockwood, "Deep packet inspection using parallel Bloom, filters," IEEE Micro, vol. 24, no. 1, pp. 52-61, Jan. 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.1
, pp. 52-61
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.S.3
Lockwood, J.W.4
-
25
-
-
33746900094
-
Bitwise optimized CAM for network intrusion detection systems
-
S. Yusuf and W. Luk, "Bitwise optimized CAM for network intrusion detection systems," in Proc. Int. Conf. Field Program. Logic Appl., 2005, pp. 444-449.
-
(2005)
Proc. Int. Conf. Field Program. Logic Appl
, pp. 444-449
-
-
Yusuf, S.1
Luk, W.2
-
26
-
-
33847103706
-
Performance of FPGA implementation of bit-split architecture for intrusion detection systems
-
presented at the, Rodos, Greece
-
H.-J. Jung, Z. K. Baker, and V. K. Prasanna, "Performance of FPGA implementation of bit-split architecture for intrusion detection systems," presented at the Reconfigurable Arch. Workshop IPDPS (RAW), Rodos, Greece, 2006.
-
(2006)
Reconfigurable Arch. Workshop IPDPS (RAW)
-
-
Jung, H.-J.1
Baker, Z.K.2
Prasanna, V.K.3
-
27
-
-
38349122169
-
-
Online, Available
-
Xilinx, San Jose, CA, "VirtexE, Viitex2, Virtex2Pro, and Spartan3 datasheets," 2006. [Online]. Available: http://www.xilinx.com
-
(2006)
VirtexE, Viitex2, Virtex2Pro, and Spartan3 datasheets
-
-
Xilinx, S.J.C.A.1
-
28
-
-
0020178736
-
A hardware hashing scheme in the design of a multiterm string comparator
-
Sep
-
F. J. Burkowski, "A hardware hashing scheme in the design of a multiterm string comparator," IEEE Trans. Comput., vol. 31, no. 9, pp. 825-834, Sep. 1982.
-
(1982)
IEEE Trans. Comput
, vol.31
, Issue.9
, pp. 825-834
-
-
Burkowski, F.J.1
-
29
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. C. Merkle, "Protocols for public key cryptosystems," in Proc. IEEE Symp. Security Privacy, 1980, pp. 122-134.
-
(1980)
Proc. IEEE Symp. Security Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
30
-
-
0030123476
-
Minimization of exclusive sum-of-products expressions for multiple-valued input, incompletely specified functions
-
Apr
-
N. Song and M. A. Perkowski, "Minimization of exclusive sum-of-products expressions for multiple-valued input, incompletely specified functions," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol. 15, no. 4, pp. 385-395, Apr. 1996.
-
(1996)
IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst
, vol.15
, Issue.4
, pp. 385-395
-
-
Song, N.1
Perkowski, M.A.2
-
31
-
-
0029519516
-
An enhanced algorithm for the minimization, of exclusive-OR sum-of-products for incompletely specified functions
-
T. Kozlowski, E. L. Dagless, and J. Saul, "An enhanced algorithm for the minimization, of exclusive-OR sum-of-products for incompletely specified functions," in Proc. Int. Conf. Comput. Des., 1995, pp. 244-249.
-
(1995)
Proc. Int. Conf. Comput. Des
, pp. 244-249
-
-
Kozlowski, T.1
Dagless, E.L.2
Saul, J.3
-
32
-
-
33746878284
-
Mutable codesign for embedded protocol processing
-
T. Sproull, G. Brebner, and C. Neely, "Mutable codesign for embedded protocol processing," in Proc. Int. Conf. Field Program. Logic Appl., 2005, pp. 51-56.
-
(2005)
Proc. Int. Conf. Field Program. Logic Appl
, pp. 51-56
-
-
Sproull, T.1
Brebner, G.2
Neely, C.3
|