-
2
-
-
33845898912
-
Characterizing antivirus workload execution
-
D. Uluski, M. Moffie, and D. Kaeli, "Characterizing antivirus workload execution," SIGARCH Comp., ACM, 2005, 33, 90-98.
-
(2005)
SIGARCH Comp., ACM
, vol.33
, pp. 90-98
-
-
Uluski, D.1
Moffie, M.2
Kaeli, D.3
-
4
-
-
63049085816
-
-
Snort. http://www.snort.org.
-
Snort
-
-
-
5
-
-
1842473700
-
The Bloomier filter: An efficient data structure for static support lookup tables
-
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal, "The Bloomier filter: an efficient data structure for static support lookup tables," Society for Industrial and Applied Mathematics, 2004, 30-39.
-
(2004)
Society for Industrial and Applied Mathematics
, pp. 30-39
-
-
Chazelle, B.1
Kilian, J.2
Rubinfeld, R.3
Tal, A.4
-
6
-
-
17744398417
-
Gigabit rate packet pattern-matching using TCAM
-
F. Yu, R. Katz, and T. Lakshman, "Gigabit rate packet pattern-matching using TCAM," IEEE Int'l. Conf. on Network Protocols, 2004, 174-183.
-
(2004)
IEEE Int'l. Conf. on Network Protocols
, pp. 174-183
-
-
Yu, F.1
Katz, R.2
Lakshman, T.3
-
7
-
-
84963983866
-
Fast Regular Expression Matching Using FPGAs
-
R. Sidhu and V. Prasanna, "Fast Regular Expression Matching Using FPGAs," IEEE Symp. on FCCM, 2001, 227-238.
-
(2001)
IEEE Symp. on FCCM
, pp. 227-238
-
-
Sidhu, R.1
Prasanna, V.2
-
8
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Comm. ACM, 1975, 18, 333-340.
-
(1975)
Comm. ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
9
-
-
38549173266
-
High-performance pattern-matching for intrusion detection
-
J. van Lunteren, "High-performance pattern-matching for intrusion detection," IEEE Int'l. Conf. on Comp. Comm., 2006, 1-13.
-
(2006)
IEEE Int'l. Conf. on Comp. Comm
, pp. 1-13
-
-
van Lunteren, J.1
-
10
-
-
27544490145
-
A high throughput string matching architecture for intrusion detection and prevention
-
L. Tan and T. Sherwood, "A high throughput string matching architecture for intrusion detection and prevention," International Symposium on Computer Architecture, 2005, 112-122.
-
(2005)
International Symposium on Computer Architecture
, pp. 112-122
-
-
Tan, L.1
Sherwood, T.2
-
11
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
4
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," Proc. INFOCOM 2004, 2004, 4, 2628-2639 vol. 4.
-
(2004)
Proc. INFOCOM
, vol.2004
, Issue.4
, pp. 2628-2639
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
12
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Comm. ACM, 1970, 13, 422-426.
-
(1970)
Comm. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
13
-
-
84944030124
-
Deep packet inspection using parallel Bloom filters
-
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood, "Deep packet inspection using parallel Bloom filters," Symposium on High Performance Interconnects, 2003, 44-51.
-
(2003)
Symposium on High Performance Interconnects
, pp. 44-51
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
15
-
-
33746933463
-
A reconfigurable perfect-hashing scheme for packet inspection
-
I. Sourdis, D. Pnevmatikatos, S. Wong, and S. Vassiliadis, "A reconfigurable perfect-hashing scheme for packet inspection," FPL, 2005, 644-647.
-
(2005)
FPL
, pp. 644-647
-
-
Sourdis, I.1
Pnevmatikatos, D.2
Wong, S.3
Vassiliadis, S.4
-
17
-
-
50149092436
-
Applying cuckoo hashing for FPGA-based pattern matching in NIDS/NIPS
-
T. N. Thinh, S. Kittitornkun, and S. Tomiyama, "Applying cuckoo hashing for FPGA-based pattern matching in NIDS/NIPS," ICFPT 2007, 2007, 121-128.
-
(2007)
ICFPT 2007
, pp. 121-128
-
-
Thinh, T.N.1
Kittitornkun, S.2
Tomiyama, S.3
-
18
-
-
50049108670
-
MRSI: A fast pattern matching algorithm for anti-virus applications
-
X. Zhou, B. Xu, Y. Qi, and J. Li, "MRSI: A fast pattern matching algorithm for anti-virus applications," Int'l. Conf. on Networking, 2008, 256-261.
-
(2008)
Int'l. Conf. on Networking
, pp. 256-261
-
-
Zhou, X.1
Xu, B.2
Qi, Y.3
Li, J.4
-
19
-
-
33845913493
-
Chisel: A storage-efficient, collision-free hash-based network processing architecture
-
J. Hasan, S. Cadambi, V. Jakkula, and S. Chakradhar, "Chisel: A storage-efficient, collision-free hash-based network processing architecture," Int'l Symp. on Computer Architecture, 2006, 203-215.
-
(2006)
Int'l Symp. on Computer Architecture
, pp. 203-215
-
-
Hasan, J.1
Cadambi, S.2
Jakkula, V.3
Chakradhar, S.4
|