-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A.V. Aho and M.J. Corasick, Efficient string matching: An aid to bibliographic search, Communications of the ACM 18(6) (1975), 333-340.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
2
-
-
0038442927
-
Payments and banking with mobile personal devices
-
Amir Herzberg, Payments and banking with mobile personal devices, Communications of the ACM 46(5) (2003), 53-58.
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
, pp. 53-58
-
-
Herzberg, A.1
-
5
-
-
85013598807
-
An agent based intrusion detection model for mobile ad hoc networks
-
IOS Press
-
B.M. Reshmi and S.S. Manvi, Bhagyavati, An agent based intrusion detection model for mobile ad hoc networks, Mobile Information Systems 2(4) (2006), 169-191, IOS Press.
-
(2006)
Mobile Information Systems
, vol.2
, Issue.4
, pp. 169-191
-
-
Reshmi, B.M.1
Manvi, S.S.2
Bhagyavati3
-
6
-
-
84976228809
-
A string matching algorithm fast on the average
-
LNCS, Springer-Verlag, Berlin
-
B. Commentz-Walter, A string matching algorithm fast on the average, in: Proceedings of the 6th International Colloquium on Automata, Languages and Programming. LNCS, vol. 71, Springer-Verlag, Berlin, 1979, 118-132.
-
(1979)
Proceedings of the 6th International Colloquium on Automata, Languages and Programming
, vol.71
, pp. 118-132
-
-
Commentz-Walter, B.1
-
8
-
-
0031191914
-
ARM Architecture and Systems
-
D. Jaggar, ARM Architecture and Systems, IEEE Micro 17(4) (1997), 9-11.
-
(1997)
IEEE Micro
, vol.17
, Issue.4
, pp. 9-11
-
-
Jaggar, D.1
-
9
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
D. Dagon, T. Martin and T. Starner, Mobile phones as computing devices: the viruses are coming!, Pervasive Computing, IEEE 3 (2004), 11-15.
-
(2004)
Pervasive Computing, IEEE
, vol.3
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
10
-
-
0000904908
-
Fast Pattern Matching in Strings
-
D.E. Knuth, J.H. Morris and V.R. Pratt, Fast Pattern Matching in Strings, SIAM Journal on Computing 6(2) (1977), 323-350.
-
(1977)
SIAM Journal on Computing
, vol.6
, Issue.2
, pp. 323-350
-
-
Knuth, D.E.1
Morris, J.H.2
Pratt, V.R.3
-
11
-
-
33846595254
-
Hash-AV: Fast Virus Signature Scanning by Cache-Resident Filters
-
Erdogan, O. Pei Cao, Hash-AV: Fast Virus Signature Scanning by Cache-Resident Filters, in: IEEE Global Telecommunications Conference, 2005, 1767-1772.
-
(2005)
IEEE Global Telecommunications Conference
, pp. 1767-1772
-
-
Erdogan, O.1
Cao, P.2
-
12
-
-
17744398417
-
Gigabit rate packet pattern-matching using TCAM
-
Fang Yu Katz, R.H. Lakshman, T.V., Gigabit rate packet pattern-matching using TCAM, in: Proceedings of the 12th IEEE International Conference on Network Protocols, 2004, 174-183.
-
(2004)
Proceedings of the 12th IEEE International Conference on Network Protocols
, pp. 174-183
-
-
Katz, F.Y.1
Lakshman, R.H.2
Lakshman, T.V.3
-
14
-
-
0030216542
-
Neural Networks for Computer Virus Recognition
-
G. Tesauro, J.O. Kephart and G.B. Sorken, Neural Networks for Computer Virus Recognition, IEEE Expert 11(4) (1996), 5-6.
-
(1996)
IEEE Expert
, vol.11
, Issue.4
, pp. 5-6
-
-
Tesauro, G.1
Kephart, J.O.2
Sorken, G.B.3
-
17
-
-
0038038229
-
Blueprint for a Computer Immune System
-
Springer-Verlag
-
J.O. Kephart, G.B. Sorkin, M. Swimmer and S.R. White, Blueprint for a Computer Immune System, Artificial Immune Systems and Their Applications, Springer-Verlag, 1999, 221-241.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 221-241
-
-
Kephart, J.O.1
Sorkin, G.B.2
Swimmer, M.3
White, S.R.4
-
18
-
-
0347023984
-
Evolution of wireless data services: IS-95 to cdma2000
-
D.N. Knisely, S. Kumar, S. Laha and S. Nanda, Evolution of wireless data services: IS-95 to cdma2000, Communications Magazine, IEEE 36(10) (1998), 140-149.
-
(1998)
Communications Magazine, IEEE
, vol.36
, Issue.10
, pp. 140-149
-
-
Knisely, D.N.1
Kumar, S.2
Laha, S.3
Nanda, S.4
-
19
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
M.G. Schultz, E. Eskin, E. Zadok and S.J. Stolfo, Data Mining Methods for Detection of New Malicious Executables, in: IEEE Symposium on Security and Privacy, 2001, 38-49.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 38-49
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
20
-
-
85090433665
-
Snort-Lightweight Intrusion Detection for Networks
-
M. Roesch, Snort-Lightweight Intrusion Detection for Networks, in: Proceedings of the 13th LISA Conference, 1999, 229-238.
-
(1999)
Proceedings of the 13th LISA Conference
, pp. 229-238
-
-
Roesch, M.1
-
22
-
-
0034499471
-
The future generations of mobile communications based on broadband access technologies
-
S. Ohmori, Y. Yamao and N. Nakajima, The future generations of mobile communications based on broadband access technologies, Communications Magazine, IEEE 38(12) (2000), 134-142.
-
(2000)
Communications Magazine, IEEE
, vol.38
, Issue.12
, pp. 134-142
-
-
Ohmori, S.1
Yamao, Y.2
Nakajima, N.3
-
24
-
-
85013585364
-
-
on DJB hash. URL
-
R.S. Engelschall, on DJB hash. URL http://gcov.php.net/PHP 5 1/lcov/php-src/Zend/zend hash.h.gcov.php.
-
-
-
Engelschall, R.S.1
-
29
-
-
0016437461
-
Approximate algorithms for 0/1 knapsack problem
-
S. Sahni, Approximate algorithms for 0/1 knapsack problem, Journal of the ACM 22(11) (1975), 115-124.
-
(1975)
Journal of the ACM
, vol.22
, Issue.11
, pp. 115-124
-
-
Sahni, S.1
-
33
-
-
85013568104
-
An efficient signature representation and matching method for mobile devices
-
D. Venugopal, An efficient signature representation and matching method for mobile devices, in: Proceedings of Conference on Wireless Internet, 2006.
-
(2006)
Proceedings of Conference on Wireless Internet
-
-
Venugopal, D.1
-
36
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Y. Zhang, W. Lee and Yi-an Huang, Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks 9(5) (2003), 545-556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|