References in zbMATH (referenced in 44 articles )

Showing results 1 to 20 of 44.
Sorted by year (citations)

1 2 3 next

  1. Weideman, Nicolaas; van der Merwe, Brink; Berglund, Martin; Watson, Bruce: Analyzing matching time behavior of backtracking regular expression matchers by using ambiguity of NFA (2016)
  2. Bul’ajoul, Waleed; James, Anne; Pannu, Mandeep: Improving network intrusion detection system performance through quality of service configuration and parallel technology (2015) ioport
  3. Razzaq, Abdul; Latif, Khalid; Ahmad, H.Farooq; Hur, Ali; Anwar, Zahid; Bloodsworth, Peter Charles: Semantic security against web application attacks (2014) ioport
  4. Shin, Seon-Ho; Im, Eun-Jin; Yoon, MyungKeun: A grand spread estimator using a graphics processing unit (2014) ioport
  5. Xiong, Wei; Hu, Hanping; Xiong, Naixue; Yang, Laurence T.; Peng, Wen-Chih; Wang, Xiaofei; Qu, Yanzhen: Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications (2014) ioport
  6. Gómez, J.; Gil, C.; Baños, R.; Márquez, A.L.; Montoya, F.G.; Montoya, M.G.: A Pareto-based multi-objective evolutionary algorithm for automatic rule generation in network intrusion detection systems (2013) ioport
  7. Mitra, Mahasweta; Banerjee, Prithu; Barbhuiya, Ferdous A.; Biswas, Santosh; Nandi, Sukumar: IDS for ARP spoofing using LTL based discrete event system framework (2013) ioport
  8. Shafi, Kamran; Abbass, Hussein A.: Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection (2013) ioport
  9. Ippoliti, Dennis; Zhou, Xiaobo: A-GHSOM: an adaptive growing hierarchical self organizing map for network anomaly detection (2012) ioport
  10. Lee, Sang Min; Kim, Dong Seong; Lee, Je Hak; Park, Jong Sou: Detection of DDos attacks using optimized traffic matrix (2012) ioport
  11. Liu, Yanbing; Guo, Li; Liu, Ping; Tan, Jianlong: Compressing regular expressions’ DFA table by matrix decomposition (2011)
  12. Tan, Guang-Ming; Liu, Ping; Bu, Dong-Bo; Liu, Yan-Bing: Revisiting multiple pattern matching algorithms for multi-core architecture (2011)
  13. Zhu, Quanyan; Başar, Tamer: Indices of power in optimal IDS default configuration: theory and examples (2011)
  14. Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J.: On the infeasibility of modeling polymorphic shellcode re-thinking the role of learning in intrusion detection systems (2010) ioport
  15. Wu, Chengkun; Yin, Jianping; Cai, Zhiping; Zhu, En; Cheng, Jieren: An efficient pre-filtering mechanism for parallel intrusion detection based on many-core GPU (2010)
  16. Xue, Chun Jason; Liu, Meilin; Zhuge, Qingfeng; Sha, Edwin Hsing-Mean: Variable length pattern matching for hardware network intrusion detection system (2010) ioport
  17. Zhang, Guangsen; Parashar, Manish: Cooperative detection and protection against network attacks using decentralized information sharing (2010) ioport
  18. Zhang, Meng; Zhang, Yi; Hu, Liang: A faster algorithm for matching a set of patterns with variable length don’t cares (2010)
  19. Al-Mamory, Safaa O.; Zhang, Hongli: IDS alerts correlation using grammar-based approach (2009) ioport
  20. Song, Tian; Wang, Dongsheng; Tang, Zhizhong: A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention (2009)

1 2 3 next