-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
June
-
A. V. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. In Communications of the ACM, June 1975.
-
(1975)
Communications of the ACM
-
-
Aho, A.V.1
Corasick, M.J.2
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Oakland, California, May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, Oakland, California, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
8
-
-
0036090387
-
STATL: An attack language for state-based intrusion detection
-
S. T. Eckmann, G. Vigna, and R. A. Kemmerer. STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10(1/2):71-104, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 71-104
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
9
-
-
1542350966
-
Fast content-based packet handling for intrusion detection. TR CS2001-0670, UC San Diego
-
May
-
M. Fisk and G. Varghese. Fast content-based packet handling for intrusion detection. TR CS2001-0670, UC San Diego, May 2001.
-
(2001)
-
-
Fisk, M.1
Varghese, G.2
-
10
-
-
50249162912
-
Nondeterministic polynomial time versus nondeterministic logarthmic space: Time-space tradeoffs for satisfiability
-
L. Fortnow. Nondeterministic polynomial time versus nondeterministic logarthmic space: Time-space tradeoffs for satisfiability. In Proceedings of Twelfth IEEE Conference on Computational Complexity, 1997.
-
(1997)
Proceedings of Twelfth IEEE Conference on Computational Complexity
-
-
Fortnow, L.1
-
11
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
August
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Usenix Security, August 2001.
-
(2001)
Usenix Security
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
13
-
-
50249084831
-
-
M. Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
-
M. Jordan. Dealing with metamorphism. Virus Bulletin Weekly, 2002.
-
-
-
-
14
-
-
38049032244
-
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
-
September
-
S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In Proceedings of ACM SIGCOMM, September 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Kumar, S.1
Dharmapurikar, S.2
Yu, F.3
Crowley, P.4
Turner, J.5
-
15
-
-
79551630961
-
A fast string-matching algorithm for network processor-based intrusion detection system
-
R-T Liu, N-F Huang, C-H Chen, and C-N Kao. A fast string-matching algorithm for network processor-based intrusion detection system. Transactions on Embedded Computing Sys., 3(3):614-633, 2004.
-
(2004)
Transactions on Embedded Computing Sys
, vol.3
, Issue.3
, pp. 614-633
-
-
Liu, R.-T.1
Huang, N.-F.2
Chen, C.-H.3
Kao, C.-N.4
-
18
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. In Computer Networks, volume 31, pages 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
19
-
-
37249008138
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
January
-
T. Ptacek and T. Newsham. Insertion, evasion and denial of service: Eluding network intrusion detection. In Secure Networks, Inc., January 1998.
-
(1998)
Secure Networks, Inc
-
-
Ptacek, T.1
Newsham, T.2
-
23
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
August
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Usenix Security, August 1999.
-
(1999)
Usenix Security
-
-
Sekar, R.1
Uppuluri, P.2
-
30
-
-
84945708555
-
Programming techniques: Regular expression search algorithm
-
K. Thompson. Programming techniques: Regular expression search algorithm. Commun. ACM, 11(6):419-422, 1968.
-
(1968)
Commun. ACM
, vol.11
, Issue.6
, pp. 419-422
-
-
Thompson, K.1
-
33
-
-
34547662263
-
Fast and memory-efficient regular expression matching for deep packet inspection
-
F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In Proceedings of Architectures for Networking and Communications Systems (ANCS), pages 93-102, 2006.
-
(2006)
Proceedings of Architectures for Networking and Communications Systems (ANCS)
, pp. 93-102
-
-
Yu, F.1
Chen, Z.2
Diao, Y.3
Lakshman, T.V.4
Katz, R.H.5
|