咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 12 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...

主题

  • 15 篇 string matching ...
  • 2 篇 automatic signat...
  • 2 篇 intrusion detect...
  • 2 篇 smith-waterman a...
  • 2 篇 fpga
  • 2 篇 js.cassandra vir...
  • 1 篇 hadoop clusterin...
  • 1 篇 real-time ids
  • 1 篇 map-reduce progr...
  • 1 篇 network security...
  • 1 篇 rules language
  • 1 篇 de bruijn graph
  • 1 篇 api/function
  • 1 篇 local pairwise s...
  • 1 篇 visual domain re...
  • 1 篇 malicious
  • 1 篇 generalized peri...
  • 1 篇 data mining algo...
  • 1 篇 aho-corasick alg...
  • 1 篇 snort

机构

  • 2 篇 auckland univ te...
  • 1 篇 univ so calif de...
  • 1 篇 dankook univ sch...
  • 1 篇 univ politecn ma...
  • 1 篇 lspu siniloan ca...
  • 1 篇 tsinghua univ de...
  • 1 篇 kyushu univ dept...
  • 1 篇 dankook univ sch...
  • 1 篇 kyoto univ dept ...
  • 1 篇 kyoto univ dept ...
  • 1 篇 univ marne la va...
  • 1 篇 isfahan univ tec...
  • 1 篇 natl inst tech t...
  • 1 篇 dalian univ tech...
  • 1 篇 ho chi minh city...
  • 1 篇 irib univ engn d...
  • 1 篇 mits dept cse & ...
  • 1 篇 univ western aus...
  • 1 篇 kings coll londo...
  • 1 篇 netexpose cretei...

作者

  • 2 篇 narayanan ajit
  • 2 篇 naidu vijay
  • 1 篇 ho thienluan
  • 1 篇 nguyen tan cam
  • 1 篇 lucena fred loui...
  • 1 篇 carter a.
  • 1 篇 paygane ranel h.
  • 1 篇 dixit manish
  • 1 篇 takeda masayuki
  • 1 篇 englert t.
  • 1 篇 crochemore m
  • 1 篇 balahadia franci...
  • 1 篇 nguyen van nhuon...
  • 1 篇 yang suying
  • 1 篇 stefanov vt
  • 1 篇 bojanic s.
  • 1 篇 behdadfar mohamm...
  • 1 篇 inenaga shunsuke
  • 1 篇 oh seung-rohk
  • 1 篇 cao dang tan

语言

  • 12 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=string matching algorithm"
15 条 记 录,以下是1-10 订阅
排序:
Scalable, High-Throughput and Modular Hardware-Based string matching algorithm  11
Scalable, High-Throughput and Modular Hardware-Based String ...
收藏 引用
11th International ISC Conference on Information Security and Cryptology (ISCISC)
作者: Hajiabadi, Mohammad Hossein Saidi, Hossein Behdadfar, Mohammad Isfahan Univ Technol Dept Elect & Comp Engn Esfahan Iran IRIB Univ Engn Dept Tehran Iran
string matching is the primary function of signature based intrusion detection systems. In this paper, a novel string matching algorithm is proposed based on the idea of searching words in a dictionary. We have also p... 详细信息
来源: 评论
MDH: A high speed Multi-phase Dynamic Hash string matching algorithm for large-scale pattern set
MDH: A high speed Multi-phase Dynamic Hash string matching a...
收藏 引用
9th International Conference on Information and Communications Security
作者: Zhou, Zongwei Xue, Yibo Liu, Junda Zhang, Wei Li, Jun Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Tsinghua Univ Res Inst Informat Technol Beijing 100084 Peoples R China Tsing Hua Nat Lab Informat Sci & Technol Beijing 100084 Peoples R China
string matching algorithm is one of the key technologies in numerous network security applications and systems. Nowadays, the increasing network bandwidth and pattern set size both calls for high speed string matching... 详细信息
来源: 评论
PAC-k: A Parallel Aho-Corasick string matching Approach on Graphic Processing Units Using Non-Overlapped Threads
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2016年 第7期E99B卷 1523-1531页
作者: Ho, ThienLuan Oh, Seung-Rohk Kim, HyunJin Dankook Univ Sch Elect & Elect Engn Signal & Syst Lab Yongin South Korea Dankook Univ Sch Elect & Elect Engn Yongin South Korea
A parallel Aho-Corasick (AC) approach, named PAC-k, is proposed for string matching in deep packet inspection (DPI). The proposed approach adopts graphic processing units (GPUs) to perform the string matching in paral... 详细信息
来源: 评论
Using Different Substitution Matrices in a string-matching Technique for Identifying Viral Polymorphic Malware Variants
Using Different Substitution Matrices in a String-Matching T...
收藏 引用
IEEE Congress on Evolutionary Computation (CEC) held as part of IEEE World Congress on Computational Intelligence (IEEE WCCI)
作者: Naidu, Vijay Narayanan, Ajit Auckland Univ Technol Sch Comp & Math Sci Auckland New Zealand
Antivirus systems have difficulty in detecting polymorphic variants of known viruses without explicit signatures for such variants. Initial work on investigating efficient and effective string-based approaches for the... 详细信息
来源: 评论
SSSM-Semantic set and string matching based malware detection
SSSM-Semantic set and string matching based malware detectio...
收藏 引用
7th IEEE Symposium on Computational Intelligence for Security and Defense Applications (IEEE-CISDA)
作者: Nguyen Van Nhuong Vo Thi Yen Nhi Nguyen Tan Cam Mai Xuan Phu Cao Dang Tan Ho Chi Minh City Univ Sci Dept Informat Technol Ho Chi Minh City Vietnam Hoa Sen Univ Dept Informat Technol Ho Chi Minh City Vietnam
Malware is a program used to disrupt computer operation or to gather the sensitive information or to gain access to private computer system. Malware detection methods can only work well on some specific types of malwa... 详细信息
来源: 评论
FAULT-TOLERANT NETWORKS BASED ON THE DE BRUIJN GRAPH
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1991年 第10期40卷 1167-1174页
作者: SRIDHAR, MA RAGHAVENDRA, CS UNIV SO CALIF DEPT ELECT ENGN SYSTLOS ANGELESCA 90089
We introduce a new class of networks based on the de Bruijn graph. These directed graphs are regular of degree k, have N = k(n) vertices for some n, and can tolerate up to k - 2 node faults. Their fault-free diameter ... 详细信息
来源: 评论
Generalized pattern matching and periodicity under substring consistent equivalence relations
收藏 引用
THEORETICAL COMPUTER SCIENCE 2016年 第PartB期656卷 225-233页
作者: Matsuoka, Yoshiaki Aoki, Takahiro Inenaga, Shunsuke Bannai, Hideo Takeda, Masayuki Kyushu Univ Dept Informat Fukuoka Japan Kyushu Univ Dept Elect Engn & Comp Sci Fukuoka Japan
Let approximate to be a substring consistent equivalence relation (SCER) on strings such that for any two strings x, y, x approximate to y implies that (1) vertical bar x vertical bar = vertical bar y vertical bar and... 详细信息
来源: 评论
Waiting time and complexity for matching patterns with automata
收藏 引用
INFORMATION PROCESSING LETTERS 2003年 第3期87卷 119-125页
作者: Crochemore, M Stefanov, VT Univ Marne la Vallee Inst Gaspard Monge F-77454 Marne La Vallee 2 France Kings Coll London London WC2R 2LS England Univ Western Australia Sch Math & Stat Perth WA 6009 Australia
The paper shows how to compute exactly expectations, standard deviations, and cumulative probabilities of the searching times of string-matching algorithms based on the use of automata. This is derived from a methodol... 详细信息
来源: 评论
Real-time Context-aware Network Security Policy Enforcement System (RC-NSPES)
Real-time Context-aware Network Security Policy Enforcement ...
收藏 引用
5th International Conference on Networking and Services (ICNS)
作者: Badii, A. Carter, A. Handzlik, A. Bojanic, S. Englert, T. Patel, D. Pejovic, V. Chorazyczewski, A. Hameed, K. Bankovic, Z. Univ Reading Reading RG6 2AH Berks England Netexpose Creteil France Microtech Int Ltd Wroclaw Poland Univ Politecn Madrid Madrid Spain
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as we... 详细信息
来源: 评论
Evolving the Efficiency of Searching Technique Using Map-Reduce Hashing Technique  1st
Evolving the Efficiency of Searching Technique Using Map-Red...
收藏 引用
1st International Conference on Smart Computing and Informatics (SCI)
作者: Pandey, Shivendra Kumar Tripathi, Priyanka Natl Inst Tech Teachers Training & Res Bhopal Madhya Pradesh India
Nowadays as data volume is increasing, it is becoming difficult to access the data within span of time. So, our aim is to process required data as fast as possible. Though we have variety of algorithms but none of the... 详细信息
来源: 评论