Author:
Ashfaq Ayesha Binte,Rizvi Sajjad,Javed Mobin,Khayam Syed Ali,Ali Muhammad Qasim,Al-Shaer Ehab
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference48 articles.
1. Aldwairi M, Conte T, Franzon P. Configurable string matching hardware for speeding up intrusion detection. In: ACM SIGARCH computer architecture news, vol. 1(33); March 2005.
2. AMD Athlon™II X2 Dual-Core Processor. 〈http://www.amd.com/us-en/Processors/ProductInformation/0,,30_118_9485_16006,00.html〉.
3. Arbor Networks PeakFlow Homepage. 〈http://www.arbornetworks.com/en/peakflow-x.html〉.
4. Ashfaq AB, Joseph M, Mumtaz A, Ali MQ, Sajjad A, Khayam SA. A comparative evaluation of anomaly detectors under portscan attacks. In: RAID; 2008.
5. Ashfaq AB, Javed M, Khayam SA, Radha H. An information-theoretic combining method for multi-classifier anomaly detection systems. In: IEEE international conference on communications (ICC); 2010.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献