[PDF][PDF] Are intrusion detection studies evaluated consistently? a systematic literature review

N Munaiah, A Meneely, R Wilson, B Short - RIT Scholar Works. Sep, 2016 - sos-vo.org
Cyberinfrastructure is increasingly becoming target of a wide spectrum of attacks from
Denial of Service to large-scale defacement of the digital presence of an organization …

STEAL: Service Time-Aware Load balancer on many-core processors for fast intrusion detection

YH Choi, WJ Park, SH Choi… - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
To realize the high-speed intrusion detection by accommodating many regex-based
signatures and the growing network link capacities, we propose a Service TimE-Aware Load …

A fast improved multiple pattern matching algorithm

AK Al-Qiari, Y Al-Issa - 2018 9th International Conference on …, 2018 - ieeexplore.ieee.org
This paper presents a novel, fast and scalable multiple string searching algorithm that can
locate many keywords within a larger text in a single pass. The new Wu-Manber variation …

Deep packet inspection time-aware load balancer on many-core processors for fast intrusion detection

YH Choi, W Park, SH Choi, SW Seo - IEIE Transactions on Smart …, 2016 - koreascience.kr
To realize high-speed intrusion detection by accommodating many regular expression
(regex)-based signatures and growing network link capacities, we propose the Service TimE …