74 results on '"Min Sik Kim"'
Search Results
2. Simulating Exploits for the Creation and Refinement of Detection Signatures.
3. Cyber situational awareness enhancement with regular expressions and an evaluation methodology.
4. An Efficient Key Management Scheme for Advanced Metering Infrastructure.
5. Increasing Diversity in Network Intrusion Detection System Evaluation.
6. OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow Processing.
7. REduce: Removing Redundancy from Regular Expression Matching in Network Security.
8. A highly deterministic hashing scheme using bitmap filter for high speed networking.
9. Protecting Run-Time Filters for Network Intrusion Detection Systems.
10. A hierarchical hashing scheme to accelerate longest prefix matching.
11. TCAM-based classification using divide-and-conquer for range expansion.
12. An application-level content generative model for network applications.
13. Efficient memory layout for packet classification system on multi-core architecture.
14. GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors.
15. Provider-level content migration strategies in P2P-based media distribution networks.
16. TrustGuard: A flow-level reputation-based DDoS defense system.
17. Simulating content in traffic for benchmarking intrusion detection systems.
18. A High-Performance 8-Tap FIR Filter Using Logarithmic Number System.
19. Identisch. Siehe bereits vorhandene Homepage. DFA-Based Regular Expression Matching on Compressed Traffic.
20. Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion.
21. Fine-Grained DDoS Detection Scheme Based on Bidirectional Count Sketch.
22. NFA-Based Pattern Matching for Deep Packet Inspection.
23. Tree-Based Minimization of TCAM Entries for Packet Classification.
24. Lightweight Traffic-Aware Packet Classification for Continuous Operation.
25. Entropy and software systems: towards an information-theoretic foundation of software testing.
26. A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup.
27. Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition.
28. Bidirectional Range Extension for TCAM-Based Packet Classification.
29. Hybrid Regular Expression Matching for Deep Packet Inspection on Multi-Core Architecture.
30. Machine Learning Algorithm Selection for Forecasting Behavior of Global Institutional Investors.
31. npf-a simple, traffic-adaptive packet classifier using on-line reorganization of rule trees.
32. Routing in the Presence of Groups in Mobile Ad Hoc Networks.
33. Rule Hashing for Efficient Packet Classification in Network Intrusion Detection.
34. Bandwidth-adaptive Clustering for Mobile Ad Hoc Networks.
35. Eliminating Bottlenecks in Overlay Multicast.
36. Application of wavelet denoising to the detection of shared congestion in overlay multimedia networks.
37. A wavelet-based approach to detect shared congestion.
38. Optimal Distribution Tree for Internet Streaming Media.
39. Transient Behaviors of TCP-friendly Congestion Control Protocols.
40. Optimal Partitioning of Multicast Receivers.
41. Scalable Clustering of Internet Paths by Shared Congestion.
42. An efficient bit-parallel algorithm for IDS.
43. Fast filtering for intrusion detection systems with the shift-or algorithm.
44. Using TCAM efficiently for IP route lookup.
45. Real-time Netshuffle: Graph distortion for on-line anonymization.
46. IP Prefix Matching with Binary and Ternary CAMs.
47. A Pipelined CRC Calculation Using Lookup Tables.
48. Traffic-aware packet matching for intrusion detection systems.
49. Efficient memory layout for packet classification system on multi-core architecture.
50. NFA-Based Pattern Matching for Deep Packet Inspection.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.