-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. Aho and M. Corasick, "Efficient string matching: an aid to bibliographic search," Communications of the ACM, pp. 333-340, 1975.
-
(1975)
Communications of the ACM
, pp. 333-340
-
-
Aho, A.1
Corasick, M.2
-
2
-
-
78650027771
-
An improved algorithm to accelerate regular expression evaluation
-
M. Becchi and P. Crowley, "An improved algorithm to accelerate regular expression evaluation," in ACM/IEEE ANCS, 2007.
-
(2007)
ACM/IEEE ANCS
-
-
Becchi, M.1
Crowley, P.2
-
3
-
-
51449088190
-
Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks
-
U. Ben-Porat, A. Bremler-Barr, and H. Levy, "Evaluating the vulnerability of network mechanisms to sophisticated DDoS attacks," in IEEE INFOCOM, 2008.
-
(2008)
InIEEE INFOCOM
-
-
Ben-Porat, U.1
Bremler-Barr, A.2
Levy, H.3
-
4
-
-
80052742911
-
CompactDFA: Generic state machine compression for scalable pattern matching
-
A. Bremler-Barr, D. Hay, and Y. Koral, "CompactDFA: Generic state machine compression for scalable pattern matching," in IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Bremler-Barr, A.1
Hay, D.2
Koral, Y.3
-
6
-
-
80052747687
-
-
[Online]
-
ClamAV, 2010. [Online]. Available: http://www.calmav.net
-
(2010)
ClamAV
-
-
-
7
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
S. A. Crosby and D. S. Wallach, "Denial of service via algorithmic complexity attacks," in Usenix Security, 2003.
-
(2003)
Usenix Security
-
-
Crosby, S.A.1
Wallach, D.S.2
-
8
-
-
69249205008
-
-
[Online]
-
DARPA Intrusion Detection Data Sets, 1998. [Online]. Available: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html
-
(1998)
DARPA Intrusion Detection Data Sets
-
-
-
9
-
-
70350155953
-
Gigabit rate packet patternmatching using TCAM
-
F. Yu, R.H. Katz, and T.V. Lakshman, "Gigabit rate packet patternmatching using TCAM," in IEEE ICNP, 2004.
-
(2004)
IEEE ICNP
-
-
Yu, F.1
Katz, R.H.2
Lakshman, T.V.3
-
10
-
-
2442461381
-
An analysis of fast string matching applied to content-based forwarding and intrusion detection
-
M. Fisk and G. Varghese, "An analysis of fast string matching applied to content-based forwarding and intrusion detection," UCSD Technical Report CS2001-0670, 2002.
-
(2002)
UCSD Technical Report CS2001-0670
-
-
Fisk, M.1
Varghese, G.2
-
11
-
-
84938015047
-
A method for the construction of minimum-redundancy codes
-
D. Huffman, "A method for the construction of minimum-redundancy codes," in Proceedings of the I.R.E., 1952, pp. 1098-1102.
-
(1952)
Proceedings of the I.R.E.
, pp. 1098-1102
-
-
Huffman, D.1
-
13
-
-
80052780335
-
HEXA: Compact data structures for faster packet processing
-
S. Kumar, J. Turner, P. Crowley, and M. Mitzenmacher, "HEXA: Compact data structures for faster packet processing," in IEEE ICNP, 2007.
-
(2007)
IEEE ICNP
-
-
Kumar, S.1
Turner, J.2
Crowley, P.3
Mitzenmacher, M.4
-
14
-
-
34547700476
-
Algorithms to accelerate multiple regular expression matching for deep packet inspection
-
S. Kumar, S. Dharmapurikar, F. Yu, P. Crowley, and J. S. Turner, "Algorithms to accelerate multiple regular expression matching for deep packet inspection," in ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Kumar, S.1
Dharmapurikar, S.2
Yu, F.3
Crowley, P.4
Turner, J.S.5
-
15
-
-
60649110475
-
Pipelined parallel AC-based approach for multistring matching
-
W. Lin and B. Liu, "Pipelined parallel AC-based approach for multistring matching," in ICPADS, 2008.
-
(2008)
ICPADS
-
-
Lin, W.1
Liu, B.2
-
18
-
-
80052767223
-
-
[Online]. Available:
-
T. Peters, 2003. [Online]. Available: http://mail.python.org/pipermail/ python-dev/2003-May/035916.html
-
(2003)
-
-
Peters, T.1
-
20
-
-
80052717797
-
-
[Online]
-
SNORT, 2010. [Online]. Available: http://www.snort.org
-
(2010)
SNORT
-
-
-
21
-
-
33644909842
-
Architectures for bit-split string scanning in intrusion detection
-
DOI 10.1109/MM.2006.5
-
L. Tan and T. Sherwood, "Architectures for Bit-Split string scanning in intrusion detection," IEEE Micro, pp. 110-117, 2006. (Pubitemid 43380042)
-
(2006)
IEEE Micro
, vol.26
, Issue.1
, pp. 110-117
-
-
Tan, L.1
Sherwood, T.2
-
22
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," in IEEE INFOCOM, 2004.
-
(2004)
IEEE INFOCOM
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
23
-
-
38549173266
-
High-performance pattern-matching for intrusion detection
-
J. van Lunteren, "High-performance pattern-matching for intrusion detection," in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Van Lunteren, J.1
-
25
-
-
80052775441
-
High performance string matching algorithm for a network intrusion prevention system (NIPS)
-
Y. Weinsberg, S. Tzur-David, D. Dolev, and T. Anker, "High performance string matching algorithm for a network intrusion prevention system (NIPS)," in IEEE HPSR, 2006.
-
(2006)
IEEE HPSR
-
-
Weinsberg, Y.1
Tzur-David, S.2
Dolev, D.3
Anker, T.4
|