Bloom filter applications in network security: A state-of-the-art survey

S Geravand, M Ahmadi - Computer Networks, 2013 - Elsevier
Undoubtedly, dealing with security issues is one of the most important and complex tasks
various networks face today. A large number of security algorithms have been proposed to …

Presence and discernability in conventional and non-photorealistic immersive augmented reality

W Steptoe, S Julier, A Steed - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Non-photorealistic rendering (NPR) has been shown as a powerful way to enhance both
visual coherence and immersion in augmented reality (AR). However, it has only been …

A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering

Z Cai, Z Wang, K Zheng, J Cao - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Longest Prefix Matching (LPM), Policy Filtering (PF), and Content Filtering (CF) are three
important tasks for Internet nowadays. It is both technologically and economically important …

A hybrid algorithm of backward hashing and automaton tracking for virus scanning

PC Lin, YD Lin, YC Lai - IEEE transactions on computers, 2010 - ieeexplore.ieee.org
Virus scanning involves computationally intensive string matching against a large number of
signatures of different characteristics. Matching a variety of signatures challenges the …

Towards fast and optimal grouping of regular expressions via DFA size estimation

T Liu, AX Liu, J Shi, Y Sun, L Guo - IEEE Journal on Selected …, 2014 - ieeexplore.ieee.org
Regular Expression (RegEx) matching, as a core operation in many network and security
applications, is typically performed on Deterministic Finite Automata (DFA) to process …

Vectored-Bloom filter for IP address lookup: Algorithm and hardware architectures

H Byun, Q Li, H Lim - Applied Sciences, 2019 - mdpi.com
The Internet Protocol (IP) address lookup is one of the most challenging tasks for Internet
routers, since it requires to perform packet forwarding at wire-speed for tens of millions of …

Near-memory & in-memory detection of fileless malware

M Botacin, A Grégio, MAZ Alves - Proceedings of the International …, 2020 - dl.acm.org
Fileless malware are recent threats to computer systems that load directly into memory, and
whose aim is to prevent anti-viruses (AVs) from successfully matching byte patterns against …

A fast and accurate hardware string matching module with Bloom filters

S Zengin, EG Schmidt - IEEE Transactions on Parallel and …, 2016 - ieeexplore.ieee.org
Many fields of computing such as Deep Packet Inspection (DPI) employ string matching
modules (SMM) that search for a given set of positive strings in their input. An SMM is …

Hardware-software codesign for high-speed signature-based virus scanning

YD Lin, PC Lin, YC Lai, TY Liu - IEEE micro, 2009 - ieeexplore.ieee.org
High-speed network content security applications often offload signature matching to
hardware. In such systems, the throughput of the overall system, rather than the hardware …

SoK-Network Intrusion Detection on FPGA

L Le Jeune, A Sateesan, MM Rabbani… - … Conference on Security …, 2021 - Springer
The amount of Internet traffic is ever increasing. With a well maintained network
infrastructure, people find their way to Internet forums, video streaming services, social …