1. Fast and scalable pattern matching for network intrusion detection systems;Darmapurikar;IEEE J. Select. Areas Commun.,2006
2. Efficient string matching: an aid to bibliographic search;Aho;Commun. ACM,1975
3. N. Tuck, T. Sherwood, B. Calder, G. Varghese, Deterministic memory-efficient string matching algorithms for intrusion detection, in: INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol.4, 2004, pp. 2628–2639.
4. J. Xu, Z. Kalbarczyk, S. Patel, R.K. Iyer, Architecture support for defending against buffer overflow attacks, in: Workshop on Evaluating and Architecting Systems for Dependability, 2002.
5. http://www.stoimen.com/blog/2012/03/27/computer-algorithms+brute-force-string-matching.