A. V. Aho and M. J. Corasick, Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, pp.333-334, 1975.
DOI : 10.1145/360825.360855

C. Semiconductor and C. , Content addressable memory

C. J. Coit, S. Staniford, and J. Mcalerney, Towards faster string matching for intrusion detection or exceeding the speed of Snort, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001.
DOI : 10.1109/DISCEX.2001.932231

M. Fish and G. Varghese, Fast Content-Based Packet Handling for Intrusion Detection " UCSD technical report, 2001.

S. Antonatos, K. G. Anagnostakis, and E. P. Markatos, Generating realistic workloads for network intrusion detection systems, Proc. of the 2004 ACM Workshop on Software and Performance
DOI : 10.1145/974043.974078

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4253

F. Yu, R. H. Katz, and T. V. Lakshman, Gigabit Rate Packet Pattern-Matching Using TCAM, Proc. of the 12th IEEE International Conference on Network Protocols

K. Lakshminarayanan, A. Rangarajan, and S. Venkatachary, Algorithms for Advanced Packet Classification with Ternary CAMs, SIGCOMM'05, 2005.
DOI : 10.1145/1080091.1080115

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.2753

S. Hua and D. Yiqi, A New Fast String Matching Algorithm for Content Filtering and Detection , Computer research and development, pp.41940-945, 2004.

Z. M. Zhong, G. J. , and D. Wei, Study of network flow timeout strategy, JOURNAL ON COMMUNICATIONS, vol.26, issue.4, pp.88-93, 2005.

L. Caviglione, A. Merlo, and M. Migliardi, Green-Aware Security: Towards a new Research Field, the, International Journal of Information Assurance and Security (JIAS), vol.7, issue.5, pp.338-346, 2012.

M. Migliardi and A. Merlo, Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches, 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013.
DOI : 10.1109/WAINA.2013.214

M. Migliardi and A. Merlo, Improving Energy Efficiency in Distributed Intrusion Detection Systems, Journal of High Speed Networks, pp.251-264, 2013.

B. Kim, I. Yang, and . You, A survey of NETLMM in all-IP-based wireless networks, Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility '08, 2008.
DOI : 10.1145/1506270.1506348

I. You, J. Lee, and K. Sakurai, DSSH: Digital signature based secure handover for network-based mobility management, Computer Systems: Science & Engineering, vol.27, issue.3, 2012.