-
1
-
-
2442461381
-
An analysis of fast string matching applied to content-based forwarding and intrusion detection,
-
CS2001-0670 updated version
-
M. Fisk and G. Varghese, "An analysis of fast string matching applied to content-based forwarding and intrusion detection," Techical Report CS2001-0670 (updated version), 2002.
-
(2002)
Techical Report
-
-
Fisk, M.1
Varghese, G.2
-
5
-
-
0017493286
-
A universal algorithm for sequential data compression
-
May
-
J. Ziv and A. Lempel, "A universal algorithm for sequential data compression," IEEE Transactions on Information Theory, pp. 337-343, May 1977.
-
(1977)
IEEE Transactions on Information Theory
, pp. 337-343
-
-
Ziv, J.1
Lempel, A.2
-
6
-
-
84938015047
-
A method for the construction of minimum-redundancy codes
-
D. Huffman, "A method for the construction of minimum-redundancy codes," Proceedings of IRE, p. 10981101, 1952.
-
(1952)
Proceedings of IRE
, pp. 10981101
-
-
Huffman, D.1
-
7
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. Aho and M. Corasick, "Efficient string matching: an aid to bibliographic search," Communications of the ACM, pp. 333-340, 1975.
-
(1975)
Communications of the ACM
, pp. 333-340
-
-
Aho, A.1
Corasick, M.2
-
8
-
-
0017547820
-
A fast string searching algorithm
-
October
-
R. Boyer and J. Moore, "A fast string searching algorithm," Communications of the ACM, pp. 762-772, October 1977.
-
(1977)
Communications of the ACM
, pp. 762-772
-
-
Boyer, R.1
Moore, J.2
-
9
-
-
70349673253
-
-
accessed on July 2008
-
"Snort." http://www.snort.org (accessed on July 2008).
-
-
-
-
10
-
-
8344251916
-
Deterministic memoryefficient string matching algorithms for intrusion detection
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memoryefficient string matching algorithms for intrusion detection," in INFOCOM 2004, 2004.
-
(2004)
INFOCOM 2004
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
11
-
-
51349102260
-
A memory efficient multiple pattern matching architecture for network security
-
April
-
T. Song, W. Zhang, D. Wang, and Y. Xue, "A memory efficient multiple pattern matching architecture for network security," in INFOCOM 2008, pp. 166-170, April 2008.
-
(2008)
INFOCOM 2008
, pp. 166-170
-
-
Song, T.1
Zhang, W.2
Wang, D.3
Xue, Y.4
-
13
-
-
47749130455
-
A memory-efficient reconfigurable aho-corasick fsm implementation for intrusion detection systems
-
July
-
V. Dimopoulos, I. Papaefstathiou, and D. Pnevmatikatos, "A memory-efficient reconfigurable aho-corasick fsm implementation for intrusion detection systems," in Embedded Computer Systems: Architectures, Modeling and Simulation. IC-SAMOS, pp. 186-193, July 2007.
-
(2007)
Embedded Computer Systems: Architectures, Modeling and Simulation. IC-SAMOS
, pp. 186-193
-
-
Dimopoulos, V.1
Papaefstathiou, I.2
Pnevmatikatos, D.3
-
14
-
-
46149109486
-
High speed pattern matching for network ids/ips
-
M. Alicherry, M. Muthuprasanna, and V. Kumar, "High speed pattern matching for network ids/ips," in ICNP, pp. 187-196, 2006.
-
(2006)
ICNP
, pp. 187-196
-
-
Alicherry, M.1
Muthuprasanna, M.2
Kumar, V.3
-
15
-
-
0030129729
-
Let sleeping files lie: Pattern matching in z-compressed files
-
A. Amir, G. Benson, and M. Farach, "Let sleeping files lie: Pattern matching in z-compressed files," Journal of Computer and System Sciences, pp. 299-307, 1996.
-
(1996)
Journal of Computer and System Sciences
, pp. 299-307
-
-
Amir, A.1
Benson, G.2
Farach, M.3
-
16
-
-
70349664126
-
Shift-and approach to pattern matching in lzw compressed text
-
T. Kida, M. Takeda, A. Shinohara, and S. Arikawa, "Shift-and approach to pattern matching in lzw compressed text," in 10th Annual Symposium on Combinatorial Pattern Matching (CPM 99), 1999.
-
(1999)
10th Annual Symposium on Combinatorial Pattern Matching (CPM 99)
-
-
Kida, T.1
Takeda, M.2
Shinohara, A.3
Arikawa, S.4
-
19
-
-
0033893490
-
A new compression method for compressed matching
-
Snowbird, Utah, pp
-
S. Klein and D. Shapira, "A new compression method for compressed matching," in Proceedings of data compression conference DCC-2000, Snowbird, Utah, pp. 400-409, 2000.
-
(2000)
Proceedings of data compression conference DCC-2000
, pp. 400-409
-
-
Klein, S.1
Shapira, D.2
-
21
-
-
0031118558
-
A text compression scheme that allows fast searching directly in the compressed file
-
U. Manber, "A text compression scheme that allows fast searching directly in the compressed file," ACM Transactions on Information Systems (TOIS), pp. 124-136, 1997.
-
(1997)
ACM Transactions on Information Systems (TOIS)
, pp. 124-136
-
-
Manber, U.1
-
22
-
-
24044451944
-
Speeding up string pattern matching by text compression. the dawn of a new era
-
M. Takeda, Y. Shibata, T. Matsumoto, T. Kida, A. Shinohara, S. Fukamachi, T. Shinohara, and S. Arikawa, "Speeding up string pattern matching by text compression. the dawn of a new era.," Transactions of Information Processing Society of Japan, pp. 370-384, 2001.
-
(2001)
Transactions of Information Processing Society of Japan
, pp. 370-384
-
-
Takeda, M.1
Shibata, Y.2
Matsumoto, T.3
Kida, T.4
Shinohara, A.5
Fukamachi, S.6
Shinohara, T.7
Arikawa, S.8
-
23
-
-
0342521304
-
Compression: A key for next-generation text retrieval systems
-
N. Ziviani, E. de Moura, G. Navarro, and R. Baeza-Yates, "Compression: A key for next-generation text retrieval systems," Computer, 2000.
-
(2000)
Computer
-
-
Ziviani, N.1
de Moura, E.2
Navarro, G.3
Baeza-Yates, R.4
-
24
-
-
70349664125
-
-
accessed on July 2008
-
"Modsecurity." http://www.modsecurity.org (accessed on July 2008).
-
-
-
-
25
-
-
70349690132
-
-
T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction To Algorithms, The MIT Press and McGraw-Hill Book Company, 2001.
-
Introduction To Algorithms, The MIT Press and McGraw-Hill Book Company, 2001
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
|