메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Design of Bloom filter array for network anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

BLOOM FILTER ARRAYS; NETWORK ANOMALY DETECTION; NETWORKING TECHNOLOGIES; TWO DIRECTIONAL (2D) MATCHING FEATURES;

EID: 50949087226     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.281     Document Type: Conference Paper
Times cited : (5)

References (7)
  • 2
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • July
    • B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, July 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 5
    • 0003608455 scopus 로고
    • Internet control message protocol
    • RFC 792, Sept, Online, Available
    • J. Postel, "Internet control message protocol," RFC 792, Sept. 1981. [Online]. Available: http://www.faqs.org/rfcs/rfc792.html
    • (1981)
    • Postel, J.1
  • 7
    • 34547301422 scopus 로고    scopus 로고
    • MD5 CRYPTO CORE FAMILY, HDL Design House, 2002. [Online]. Available: http://www.hdl-dh.com/pdf/hcr_7910.pdf [8] Auckland-IV trace data, 2001. [Online]. Available: http://wand.cs.waikato.ac.nz/wand/wits/ auck/4/
    • MD5 CRYPTO CORE FAMILY, HDL Design House, 2002. [Online]. Available: http://www.hdl-dh.com/pdf/hcr_7910.pdf [8] "Auckland-IV trace data," 2001. [Online]. Available: http://wand.cs.waikato.ac.nz/wand/wits/ auck/4/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.