M. Crochemore, A. Czumaj, L. Ga¸sieniecga¸sieniec, S. Jarominek, T. Lecroq et al., Fast practical multi-pattern matching, Information Processing Letters, vol.71, issue.3-4, 1993.
DOI : 10.1016/S0020-0190(99)00092-7

URL : https://hal.archives-ouvertes.fr/hal-00619554

T. [. Crochemore and . Lecroq, Pattern matching and text compression algorithms The Computer Science and Engineering Handbook, 1997.

]. N. Des02 and . Desai, Increasing performance in high speed nids, a look at snort's internals, 2002.

J. [. Staniford, C. Mcalerney, and . Coit, Towards faster pattern matching for intrusion detection, DARPA Information Survivability Conference and Exposition (DISCEX II'01), 2001.

J. Kuri, G. Navarro, L. Mé, L. Heye, and M. Rusinowitch, A pattern matching based filter for audit reduction and fast detection of potential intrusions Matching a set of strings with variable length don't cares, Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), LNCS v, pp.17-27129, 1907.

C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, Stateful intrusion detection for high-speed networks

M. [. Varghese and . Fisk, Fast content-based packet handling for intrusion detection, 2001.

M. [. Wiley and . Hall, Capacity verification for high speed network intrusion detection systems, Proceedings of the 5th International Workshop on the Recent Advances in Intrusion Detection (RAID'2002), LNCS v. 2516, pp.239-251, 2002.

T. Abbes, A. Bouhoula, M. Rusinowitch, . Pcc, K. Victor et al., Preemptive distributed intrusion detection using mobile agents, Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, p.103

T. [. Ptacek and . Newsham, Insertion, evasion, and denial of service: Eluding network intrusion detection, pp.2-2, 1998.

C. [. Roesch and . Green, Snort users manual snort release, 2002.

J. [. Fried, K. Korba, R. Das, J. W. Lippmann, and . Haines, Analysis and results of the 1999 darpa off-line intrusion detection evaluation, Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), LNCS v, pp.162-182, 1907.

]. M. Roe99 and . Roesch, Snort ? lightweight intrusion detection for networks, USENIX Proceedings of the Thirteenth Systems Administration Conference (LISA XIII): November 7?12, 1999.

Y. [. Sekar, S. Guang, T. Verma, and . Shanbhag, A high-performance network intrusion detection system, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.8-17, 1999.
DOI : 10.1145/319709.319712

M. [. Wespi, H. Dacier, and . Debar, Intrusion Detection Using Variable-Length Audit Trail Patterns, Proceedings of the 3rd International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), LNCS v, pp.110-129, 1907.
DOI : 10.1007/3-540-39945-3_8