-
1
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
May
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, May 1970, pp. 422-426.
-
(1970)
Comm. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
4
-
-
42549116673
-
-
Special issues on Network Processors, Intel Technology Journal, 06, Issue 03, August 15, 2002.
-
Special issues on Network Processors, Intel Technology Journal, Volume 06, Issue 03, August 15, 2002.
-
-
-
-
7
-
-
3242768505
-
Issues in High-Speed Internet Security
-
July
-
Peder Jungck and Simon S.Y. Shim, "Issues in High-Speed Internet Security," IEEE computer magazine, Vol. 37, No. 7, pp. 36-42, July 2004.
-
(2004)
IEEE computer magazine
, vol.37
, Issue.7
, pp. 36-42
-
-
Jungck, P.1
Shim, S.S.Y.2
-
8
-
-
42549092227
-
-
First Proceedings of the 2003 ACM workshop on Rapid Malcode (WORM'2003), October 2003.
-
First Proceedings of the 2003 ACM workshop on Rapid Malcode (WORM'2003), October 2003.
-
-
-
-
9
-
-
42549108184
-
-
Second Proceedings of the 2004 ACM workshop on Rapid Malcode (WORM'2004), October 29, 2004, Washington, DC, USA.
-
Second Proceedings of the 2004 ACM workshop on Rapid Malcode (WORM'2004), October 29, 2004, Washington, DC, USA.
-
-
-
-
10
-
-
3042742908
-
An analysis of the Slapper worm
-
Pages:, Jan.-Feb
-
I. Arce and E. Levy, "An analysis of the Slapper worm," IEEE Security & Privacy, Vol. 1 No. 1, Pages: 82-87, Jan.-Feb. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
11
-
-
0742276097
-
Slammer Worm Dissection: Inside the Slammer Worm
-
Pages:, July-August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. "Slammer Worm Dissection: Inside the Slammer Worm," IEEE Security & Privacy, Vol. 1 No. 4, Pages: 33-39, July-August 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
12
-
-
3042683635
-
Worm and attack early warning: Piercing stealthy reconnaissance
-
Pages:, May-June
-
S. J. Stolfo, "Worm and attack early warning: piercing stealthy reconnaissance," IEEE Security & Privacy, Volume: 02, Issue: 3, Pages: 73-75, May-June 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 73-75
-
-
Stolfo, S.J.1
-
13
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
pages, July-Aug
-
J. Pincus and R. Baker, "Beyond stack smashing: recent advances in exploiting buffer overruns," IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 20-27: July-Aug. 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, R.2
-
14
-
-
4344627335
-
The spread of the Witty worm
-
pages, July-Aug
-
C. Shannon and D. Moore, "The spread of the Witty worm," IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 46-50, July-Aug. 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
15
-
-
4344608055
-
-
E. Levy, Approaching zero [attack trends], IEEE Security & Privacy Magazine, 2, Issue: 4, page(s): 65-66, July-Aug. 2004.
-
E. Levy, Approaching zero [attack trends], IEEE Security & Privacy Magazine, Volume 2, Issue: 4, page(s): 65-66, July-Aug. 2004.
-
-
-
-
18
-
-
27544495684
-
Worm Origin Identification Using Random Walks
-
To appear in, Oakland, CA, May
-
Y. Xie, V. Sekar, DA Maltz, MK Reiter, H. Zhang, "Worm Origin Identification Using Random Walks," To appear in Proceedings of the IEEE Symposium on Security and Privacy (Oakland 2005), Oakland, CA, May 2005.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy (Oakland 2005)
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
-
20
-
-
1842478680
-
Deep packet inspection using parallel bloom filters
-
Pages:, Jan.-Feb
-
Sarang Dharmapurikar, Praveen Krishnamurthy, T.S. Sproull and J. W. Lockwood, "Deep packet inspection using parallel bloom filters," IEEE Micro, Volume 24, Issue 1, Pages:52-61, Jan.-Feb. 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.1
, pp. 52-61
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.S.3
Lockwood, J.W.4
-
21
-
-
1842583287
-
Architecture for a hardware-based, TCP/IP content-processing system
-
Pages:, Jan.-Feb
-
D. V. Schuehler, J. Moscola and J. W. Lockwood, "Architecture for a hardware-based, TCP/IP content-processing system," IEEE Micro, Volume 24, Issue 1, Pages: 62-69, Jan.-Feb. 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.1
, pp. 62-69
-
-
Schuehler, D.V.1
Moscola, J.2
Lockwood, J.W.3
-
22
-
-
8844226734
-
-
Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li, Optimization and Benchmark of Cryptographic Algorithms on Network Processors, IEEE Micro., 24, Issue 5,Sep-Oct issues, 2004.
-
Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li, "Optimization and Benchmark of Cryptographic Algorithms on Network Processors", IEEE Micro., Volume 24, Issue 5,Sep-Oct issues, 2004.
-
-
-
-
23
-
-
42549131873
-
-
Signature of worm, see
-
Signature of worm, see http://www.clamav.net
-
-
-
-
24
-
-
42549157565
-
-
Symantec Inc, see
-
Symantec Inc., see http://www.symantec.com/
-
-
-
-
25
-
-
42549094996
-
-
Silicon Defense, see
-
Silicon Defense, see http://www.silicondefense.com
-
-
-
-
26
-
-
42549130929
-
-
Snort, see
-
Snort, see http://www.snort.org/
-
-
-
-
27
-
-
42549144038
-
-
Sourcefire, see
-
Sourcefire, see http://www.sourcefire.com/
-
-
-
-
29
-
-
42549092052
-
-
Radisys Corporations, ENP-2611 technique documents, 2004.
-
Radisys Corporations, ENP-2611 technique documents, 2004.
-
-
-
-
31
-
-
0035275672
-
ClassPI:an architecture for fast and flexible packet classification
-
Mar/Apr
-
S. Iyer, R. Rao Kompella, and A. Shelat, "ClassPI:an architecture for fast and flexible packet classification," IEEE Networks, Volume: 15, Issue: 2, Mar/Apr 2001.
-
(2001)
IEEE Networks
, vol.15
, Issue.2
-
-
Iyer, S.1
Rao Kompella, R.2
Shelat, A.3
|