Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection

G Kou, Y Peng, Z Chen, Y Shi - Information Sciences, 2009 - Elsevier
Multi-class classification problems are harder to solve and less studied than binary
classification problems. The goal of this paper is to present a multi-criteria mathematical …

Anomaly network detection model based on mobile agent

W Yu, C Xiaohui, W Sheng - 2011 Third International …, 2011 - ieeexplore.ieee.org
In order to figure out the problems which the existing intrusion detection system models
have, such as more significant network transmission load, lower detection efficiency, limited …

[PDF][PDF] Multiple pattern matching: Survey and experimental results

CS Kouzinopoulos… - Neural, Parallel, and …, 2014 - dynamicpublishers.com
This paper presents a survey of multiple pattern matching algorithms and experimental
results of the well-known Aho-Corasick, Set Horspool, Set Backward Oracle Matching, Wu …

[PDF][PDF] A Review on Literature Survey of Clusters

M Tripathy, CR Tripathy - International Journal of Advances in Engineering …, 2013 - Citeseer
The cluster computing is becoming increasingly popular. The latest technological
developments and research innovations are pushing clusters into mainstream computing …

[PDF][PDF] A hierarchical shared memory cluster architecture with load balancing and fault tolerance

M Tripathy, CR Tripathy - International Journal of Computer Applications, 2011 - Citeseer
Recently a great deal of attention has been paid to the design of hierarchical shared
memory cluster system. Cluster computing has made hierarchical computing systems …

A distributed TCAM coprocessor architecture for integrated policy filtering and content filtering

Z Cai, Z Wang, K Zheng - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
Policy Filtering (PF) and Content Filtering (CF) are two important tasks in packet forwarding
of today's Internet. It is both technologically and economically important to develop …

[PDF][PDF] Parallel and distributed implementations of multiple and two-dimensional pattern matching algorithms

CS Kouzinopoulos - 2013 - scholar.archive.org
Περίληψη Η αναζήτηση προτύπων αποτελεί ένα θεμελιώδες πρόβλημα στον κλάδο της
Επιστήμης της Πληροφορικής. Σε αυτήν την διατριβή εξετάζεται το πρόβλημα της …

Exact online two-dimensional pattern matching using multiple pattern matching algorithms

CS Kouzinopoulos, KG Margaritis - Journal of Experimental Algorithmics …, 2013 - dl.acm.org
Baker and Bird and Baeza-Yates and Regnier are two of the most efficient and widely used
algorithms for exact online two-dimensional pattern matching. Both use the automaton of the …

[PDF][PDF] A Novel Digital Library Personalized Service Scheme

L Qing-Ao, L San-Ya - scirp.org
In this paper, the characteristic of digital library personalized service and the main methods
of data mining are introduced at first. By analyzing the requirement of personalized service …

[PDF][PDF] A Fast and Scalable Multi-Pattern Matching Algorithm for Intrusion Detection Systems

CL Leea, CY Huanga, KP Lua, JH Chena - 2015 - pdfs.semanticscholar.org
In order to protect networks from attacks, network intrusion detection systems (NIDS) have
been widely deployed. These devices scan incoming packets to detect malicious content …