Author:
Shenoy Govind Sreekar,Tubella Jordi,González Antonio
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Aho, A.V., Corasick, M.J.: Efficient String Matching: An Aid to Bibliographic Search. Communications of the ACM 18(6), 333–340 (1975)
2. Becchi, M., Cadambi, S.: Memory-Efficient Regular Expression Search Using State Merging. In: Proceedings of INFOCOM 2007 (2007)
3. Bloom, B.H.: Space/time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422–426 (1970)
4. Cai, Q., Gui, Y., Johnson, R.: Exploiting Unix File-system Races via Algorithmic Complexity Attacks. In: Proceedings of IEEE Symposium on Security and Privacy (2009)
5. Cisco Inc. The Cisco QuantumFlow Processor: Cisco’s Next Generation Network Processor,
http://www.cisco.com/en/US/prod/collateral/routers/ps9343/solution_overview_c22-448936.html
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Algorithmic Complexity Attacks on Dynamic Learned Indexes;Proceedings of the VLDB Endowment;2023-12
2. SurgeProtector;Proceedings of the ACM SIGCOMM 2022 Conference;2022-08-22