-
4
-
-
0016518897
-
Efficient String Matching: An aid to bibliographic search
-
A.V. Aho and M.J. Corasick, "Efficient String Matching: An aid to bibliographic search," Communications of the ACM, pages 333-340, 1975.
-
(1975)
Communications of the ACM
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
6
-
-
0004145058
-
Insertion, evasion and denial of service: Eluding Network Intrusion Detection
-
Technical report, Securenetworks.com, January
-
T.H. Ptacek and T. N. Newsham, "Insertion, evasion and denial of service: Eluding Network Intrusion Detection," Technical report, Securenetworks.com, January 1998.
-
(1998)
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
9
-
-
39049102495
-
-
I. Buck, T. Foley, D. Horn, J. Sugerman, P. Hanrahan, M. Houston and K. Fatahalian, "BrookGPU," http://graphics.stanford.edu/projects/ brookgpu/
-
BrookGPU
-
-
Buck, I.1
Foley, T.2
Horn, D.3
Sugerman, J.4
Hanrahan, P.5
Houston, M.6
Fatahalian, K.7
-
10
-
-
39049137485
-
-
OpenGL, http://www.opengl.org/
-
-
-
-
11
-
-
39049163419
-
-
Cg, http://developer.nvidia.com/page/cg_main.html
-
Cg, http
-
-
-
12
-
-
39049161974
-
-
GLSL
-
GLSL, http://www.opengl.org/documentation/oglsl.html
-
-
-
-
13
-
-
39049148950
-
-
AGP
-
AGP, http://www.devhardware.com/c/a/Video-Cards/AGP8X-A-Closer-Look/
-
-
-
-
14
-
-
0000904908
-
Fast pattern matching in strings
-
D. E. Knuth, J. H. Morris, Jr., and V. R. Pratt, "Fast pattern matching in strings," SIAM J. Computing 6, 323-350, 1977.
-
(1977)
SIAM J. Computing
, vol.6
, pp. 323-350
-
-
Knuth, D.E.1
Morris Jr., J.H.2
Pratt, V.R.3
-
17
-
-
0033293396
-
Towards a Taxonomy of Intrusion-Detection Systems
-
23, pp
-
H. Debar, M. Dacier and A. Wespi, "Towards a Taxonomy of Intrusion-Detection Systems," Computer Networks, Vol. 31, No. 8, 23, pp. 805-822, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
19
-
-
39049114123
-
-
Contest, http://members.optusnet.com.au/ckolivas/contest/
-
Contest
-
-
-
20
-
-
39049149930
-
-
LMBench, http://www.bitmover.com/lmbench/
-
LMBench
-
-
-
21
-
-
39049154865
-
-
DBench, http://www.dbench.org/home/index.php
-
DBench
-
-
-
22
-
-
39049109667
-
-
Linux Test Project
-
Linux Test Project, http://sourceforge.net/projects/ltp/
-
-
-
-
24
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba and K. Das, "The 1999 DARPA Off-Line Intrusion Detection Evaluation," Computer Networks, pp. 579-595, 2000.
-
(2000)
Computer Networks
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
25
-
-
23944453276
-
Characterizing the Performance of Network Intrusion Detection Sensors
-
Pittsburgh, PA, USA, September 8-10
-
L. Schaelicke, T. Slabach, B. Moore and C. Freeland, "Characterizing the Performance of Network Intrusion Detection Sensors," Recent Advances in Intrusion Detection: 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003.
-
(2003)
Recent Advances in Intrusion Detection: 6th International Symposium, RAID 2003
-
-
Schaelicke, L.1
Slabach, T.2
Moore, B.3
Freeland, C.4
-
26
-
-
0027541468
-
A High-performance Network Architecture for a PA-RISC Workstation
-
Feb
-
D. Banks and M. Prudence, "A High-performance Network Architecture for a PA-RISC Workstation," IEEE Journal on Selected Areas in Communications, vol. 11, no. 2, pp. 191-202, Feb. 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.2
, pp. 191-202
-
-
Banks, D.1
Prudence, M.2
-
27
-
-
0024682852
-
An Analysis of TCP Processing Overhead
-
June
-
- D. Clark, V. Jacobson, J, Romkey and M. Salwen, "An Analysis of TCP Processing Overhead," IEEE Communications Magazine, vol. 27, pp. 23-29, June 1989.
-
(1989)
IEEE Communications Magazine
, vol.27
, pp. 23-29
-
-
Banks, D.1
Prudence, M.2
Clark, D.3
Jacobson, V.4
Romkey, J.5
Salwen, M.6
-
28
-
-
84964497101
-
Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort
-
DISCEX II 702, IEEE CS Press, Los Alamitos, Calif, pp
-
J. Coit, S. Staniford, J. McAlerney, "Towards Faster String Matching for Intrusion Detection or Exceeding the Speed of Snort," Proc. DARPA Information Survivability Conference and Exposition (DISCEX II 702), IEEE CS Press, Los Alamitos, Calif., pp. 367-373, 2001.
-
(2001)
Proc. DARPA Information Survivability Conference and Exposition
, pp. 367-373
-
-
Coit, J.1
Staniford, S.2
McAlerney, J.3
-
29
-
-
84904280510
-
A Domain-Specific String Matching Algorithm for Intrusion Detection
-
K. G. Anagnostakis, S. Antonatos, E. P. Markatos and M. Polychronakis, "A Domain-Specific String Matching Algorithm for Intrusion Detection," Proceedings of the 18th IFIP International Information Security Conference, pp. 217-228, 2003.
-
(2003)
Proceedings of the 18th IFIP International Information Security Conference
, pp. 217-228
-
-
Anagnostakis, K.G.1
Antonatos, S.2
Markatos, E.P.3
Polychronakis, M.4
-
32
-
-
39049123726
-
An Achilles? Heel in Signature-Based IDS: Squealing False Positives in Snort
-
S. Patton, W. Yurcik, D. Doss, "An Achilles? Heel in Signature-Based IDS: Squealing False Positives in Snort," Proceedings of RAID, pp. 95-114, 2001.
-
(2001)
Proceedings of RAID
, pp. 95-114
-
-
Patton, S.1
Yurcik, W.2
Doss, D.3
-
34
-
-
3142739595
-
Fast Computation of Database Operations using Graphics Processors
-
NK Govindaraju, B Lloyd, W Wang, M Lin, D Manocha, "Fast Computation of Database Operations using Graphics Processors," Proceedings of the 2004 ACM SIGMOD Conference, pp. 77-86, 2004.
-
(2004)
Proceedings of the 2004 ACM SIGMOD Conference
, pp. 77-86
-
-
Govindaraju, N.K.1
Lloyd, B.2
Wang, W.3
Lin, M.4
Manocha, D.5
-
35
-
-
0036949199
-
Physically-based visual simulation on graphics hardware
-
MJ Harris, G Coombe, T Scheuermann, A Lastra, "Physically-based visual simulation on graphics hardware," SIGGRAPH/Eurographics Workshop on Graphics Hardware, pp. 45-53, 2002
-
(2002)
SIGGRAPH/Eurographics Workshop on Graphics Hardware
, pp. 45-53
-
-
Harris, M.J.1
Coombe, G.2
Scheuermann, T.3
Lastra, A.4
-
36
-
-
18844437024
-
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code
-
Oct
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski, R. K. Cunningham, "Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code," Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 231-241, Oct. 2003
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 231-241
-
-
Rabek, J.C.1
Khazan, R.I.2
Lewandowski, S.M.3
Cunningham, R.K.4
-
38
-
-
39049152926
-
-
Lynx Processor, http://www.eonic.com/processingplatforms/lynxsar.html
-
Lynx Processor
-
-
-
39
-
-
39049151740
-
-
Tiger Processor, http://www.us.designreuse.com/news/news10176.html
-
Tiger Processor
-
-
|