Efficient string matching: an aid to bibliographic search, Communications of the ACM, vol.18, issue.6, pp.333-334, 1975. ,
DOI : 10.1145/360825.360855
Content addressable memory ,
Towards faster string matching for intrusion detection or exceeding the speed of Snort, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001. ,
DOI : 10.1109/DISCEX.2001.932231
Fast Content-Based Packet Handling for Intrusion Detection " UCSD technical report, 2001. ,
Generating realistic workloads for network intrusion detection systems, Proc. of the 2004 ACM Workshop on Software and Performance ,
DOI : 10.1145/974043.974078
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4253
Gigabit Rate Packet Pattern-Matching Using TCAM, Proc. of the 12th IEEE International Conference on Network Protocols ,
Algorithms for Advanced Packet Classification with Ternary CAMs, SIGCOMM'05, 2005. ,
DOI : 10.1145/1080091.1080115
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.2753
A New Fast String Matching Algorithm for Content Filtering and Detection , Computer research and development, pp.41940-945, 2004. ,
Study of network flow timeout strategy, JOURNAL ON COMMUNICATIONS, vol.26, issue.4, pp.88-93, 2005. ,
Green-Aware Security: Towards a new Research Field, the, International Journal of Information Assurance and Security (JIAS), vol.7, issue.5, pp.338-346, 2012. ,
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches, 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 2013. ,
DOI : 10.1109/WAINA.2013.214
Improving Energy Efficiency in Distributed Intrusion Detection Systems, Journal of High Speed Networks, pp.251-264, 2013. ,
A survey of NETLMM in all-IP-based wireless networks, Proceedings of the International Conference on Mobile Technology, Applications, and Systems, Mobility '08, 2008. ,
DOI : 10.1145/1506270.1506348
DSSH: Digital signature based secure handover for network-based mobility management, Computer Systems: Science & Engineering, vol.27, issue.3, 2012. ,