1. SNORT: The Open Source Network Intrusion Detection System.
http://www.snort.org
2. Pagh, R., Rodler, F.F.: Cuckoo hashing. Journal of Algorithms 51, 122–144 (2004)
3. Moscola, J., Lockwood, J., Loui, R.P., Pachos, M.: Implementation of a content-scanning module for an internet firewall. In: Proceedings of the 11th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM), pp. 31–38. IEEE Computer Society Press, Los Alamitos (2003)
4. Clark, C.R., Schimmel, D.E.: Scalable pattern matching for high speed networks. In: Proceedings of the 12th IEEE Symposium on FCCM, pp. 249–257. IEEE Computer Society Press, Los Alamitos (2004)
5. Sourdis, I., Pnevmatikatos, D.: Pre-decoded cams for efficient and high-speed NIDS pattern matching. In: Proceedings of the 12th IEEE Symposium on FCCM, pp. 258–267. IEEE Computer Society Press, Los Alamitos (2004)