메뉴 건너뛰기




Volumn 8672, Issue , 2014, Pages 394-403

Compressing regular expression sets for deep packet inspection

Author keywords

Evolutionary optimization; Genetic programming; Intrusion detection; Traffic classification

Indexed keywords

GENETIC ALGORITHMS; INTRUSION DETECTION; NETWORK SECURITY; PATTERN MATCHING; TREES (MATHEMATICS); EVOLUTIONARY ALGORITHMS; GENETIC PROGRAMMING; OPTIMIZATION; TELECOMMUNICATION TRAFFIC;

EID: 84921709974     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10762-2_39     Document Type: Article
Times cited : (7)

References (18)
  • 4
    • 53249104697 scopus 로고    scopus 로고
    • A scalable architecture for highthroughput regular-expression pattern matching
    • IEEE Computer Society
    • Brodie, B.C., Taylor, D.E., Cytron, R.K.: A scalable architecture for highthroughput regular-expression pattern matching. In: ACM SIGARCH Computer Architecture News, vol. 34, pp. 191–202. IEEE Computer Society (2006)
    • (2006) ACM SIGARCH Computer Architecture News , vol.34 , pp. 191-202
    • Brodie, B.C.1    Taylor, D.E.2    Cytron, R.K.3
  • 11
    • 34548095651 scopus 로고    scopus 로고
    • Synthesis of regular expressions targeting fPGAs: Current status and open issues
    • In: Diniz, P.C., Marques, E., Bertels, K., Fernandes, M.M., Cardoso, J.M.P. (eds.), Springer, Heidelberg
    • Bispo, J., Sourdis, I., Cardoso, J.M.P., Vassiliadis, S.: Synthesis of regular expressions targeting fPGAs: Current status and open issues. In: Diniz, P.C., Marques, E., Bertels, K., Fernandes, M.M., Cardoso, J.M.P. (eds.) ARCS 2007. LNCS, vol. 4419, pp. 179–190. Springer, Heidelberg (2007)
    • (2007) ARCS 2007. LNCS , vol.4419 , pp. 179-190
    • Bispo, J.1    Sourdis, I.2    Cardoso, J.M.P.3    Vassiliadis, S.4
  • 13
    • 84859430323 scopus 로고    scopus 로고
    • Toward developing a systematic approach to generate benchmark datasets for intrusion detection
    • Shiravi, A., Shiravi, H., Tavallaee, M., Ghorbani, A.A.: Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security 31(3), 357–374 (2012)
    • (2012) Computers & Security , vol.31 , Issue.3 , pp. 357-374
    • Shiravi, A.1    Shiravi, H.2    Tavallaee, M.3    Ghorbani, A.A.4
  • 17
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady 10, 707 (1966)
    • (1966) Soviet Physics Doklady , vol.10 , pp. 707
    • Levenshtein, V.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.