1. S. Antonatos, K. Anagnostakis, E. Markatos, Generating realistic workloads for network intrusion detection systems, in: Proc. ACM Workshop on Software and Performance, Jan. 2004, pp. 207–215.
2. J.B.D. Cabrera, J. Gosar, W. Lee, R.K. Mehra, On the statistical distribution of processing times in network intrusion detection, in: Proc. IEEE Conf. on Decision and Control, Dec. 2004, pp. 75–80.
3. Fast pattern matching in strings;Knuth;SIAM J. Comput.,1977
4. A fast string searching algorithm;Boyer;Commun. Assoc. Comput. Mach.,1977
5. Efficient string matching: an aid to bibliographic search;Aho;Commun. ACM,1975