-
1
-
-
3543088606
-
Generating realistic workloads for network intrusion detection systems
-
S. Antonatos, K. Anagnostakis, and E. Markatos, "Generating realistic workloads for network intrusion detection systems," Proc. ACM Workshop on Software and Performance, Jan. 2004, pp. 207-215.
-
Proc. ACM Workshop on Software and Performance, Jan. 2004
, pp. 207-215
-
-
Antonatos, S.1
Anagnostakis, K.2
Markatos, E.3
-
2
-
-
14344256540
-
On the statistical distribution of processing times in network intrusion detection
-
J. B. D. Cabrera, J. Gosar,W. Lee, and R. K. Mehra, "On the statistical distribution of processing times in network intrusion detection," Proc. IEEE Conf. on Decision and Control, Dec. 2004, pp. 75-80.
-
Proc. IEEE Conf. on Decision and Control, Dec. 2004
, pp. 75-80
-
-
Cabrera, J.B.D.1
Gosar, J.2
Lee, W.3
Mehra, R.K.4
-
3
-
-
0000904908
-
Fast pattern matching in strings
-
1977
-
D. E. Knuth, J. Morris, and V. Pratt, "Fast pattern matching in strings," SIAM J. on Computing, vol. 6, 1997, pp. 127-146, 1977.
-
(1997)
SIAM J. on Computing
, vol.6
, pp. 127-146
-
-
Knuth, D.E.1
Morris, J.2
Pratt, V.3
-
5
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
June
-
A. V. Aho and M. J. Corasick, "Efficient string matching: an aid to bibliographic search," Communications of the ACM, vol. 18, June 1975, pp. 333-340.
-
(1975)
Communications of the ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
8
-
-
84964497101
-
Towards faster string matching for intrusion detection or exceeding the speed of Snort
-
C. Coit, S. Staniford, and J. McAlerney, "Towards faster string matching for intrusion detection or exceeding the speed of Snort," Proc. DARPA Information Survivability Conference & Exposition II, June 2001, pp. 367-373.
-
Proc. DARPA Information Survivability Conference & Exposition II, June 2001
, pp. 367-373
-
-
Coit, C.1
Staniford, S.2
McAlerney, J.3
-
11
-
-
33745296947
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese, "Deterministic memory-efficient string matching algorithms for intrusion detection," Proc. IEEE Infocom Conf., 2004, pp. 333-340.
-
Proc. IEEE Infocom Conf., 2004
, pp. 333-340
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
16
-
-
24144454572
-
Cryptographics: Secret key cryptography using graphics cards
-
D. L. Cook, J. Ioannidis, A. D. Keromytis, and J. Luck, "Cryptographics: Secret key cryptography using graphics cards," Proc. RSA Conference, Cryp-tographer's Track, 2005, pp. 334-350.
-
Proc. RSA Conference, Cryp-tographer's Track, 2005
, pp. 334-350
-
-
Cook, D.L.1
Ioannidis, J.2
Keromytis, A.D.3
Luck, J.4
-
17
-
-
80053212291
-
-
Nvidia, version 4. Online, March
-
Nvidia, "cuda c best practices guide", version 4. Online, March 2011.
-
(2011)
Cuda C Best Practices Guide
-
-
-
19
-
-
56549099368
-
Gnort: High performance network intrusion detection using graphics processors
-
G. Vasiliadis , S. Antonatos , M. Polychronakis , E. P, and S. Ioannidis, "Gnort: High performance network intrusion detection using graphics processors", Proc. Intl. Symp. Recent Advances in Intrusion Detection, 2008, pp. 116-134.
-
Proc. Intl. Symp. Recent Advances in Intrusion Detection, 2008
, pp. 116-134
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
P, E.4
Ioannidis, S.5
-
20
-
-
33947588048
-
A Survey of General-Purpose Computation on Graphics Hardware
-
J.D. Owens, D. Luebke, N. Govindaraju, M. Harris, J. Krüger, A.E. Lefohn, and T. Purcell, "A Survey of General-Purpose Computation on Graphics Hardware," Computer Graphics Forum, vol. 26, 2007, pp. 80-113.
-
(2007)
Computer Graphics Forum
, vol.26
, pp. 80-113
-
-
Owens, J.D.1
Luebke, D.2
Govindaraju, N.3
Harris, M.4
Krüger, J.5
Lefohn, A.E.6
Purcell, T.7
|