Author:
Atasu Kubilay,Polig Raphael,Rohrer Jonathan,Hagleitner Christoph
Subject
Hardware and Architecture,Software
Reference33 articles.
1. SNORT network intrusion detection system. Available from: http://www.snort.org/ (accessed 2013-04-24).
2. John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2000.
3. Lin Tan, Timothy Sherwood, A high throughput string matching architecture for intrusion detection and prevention, in: Proc. ISCA ’05, 2005. pp. 112–122.
4. Piti Piyachon, Yan Luo, Design of high performance pattern matching engine through compact deterministic finite automata, in: Proc. DAC, ACM, 2008, pp. 852–857.
5. Jan van Lunteren, High-performance pattern-matching for intrusion detection, in: Proc. INFOCOM 2006, 2006, pp. 1–13.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献