Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
string matching
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
Indexes
vector index
string matching
statistical attack
secure fuzzy query
Scalability
S-BF
Resistance
Resiliency
query processing
pubcrawl
noise vector
Metrics
Bloom filter
fuzzy string matching scheme
fuzzy set theory
fuzzy query scheme
Fuzzy Query
Fuzzy Cryptography
frequency distribution
encryption
Encrypted Cloud Database
data structures
Cryptography
Cloud Computing
biblio
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification
Submitted by aekwall on Mon, 01/11/2021 - 1:34pm
telecommunication network management
traffic classification techniques
subsequent signature matching
string matching
State Transition Machine
potential application signature
Network traffic classification
good classification accuracy
flow payloads
efficient keyword matching
dpi
deep packet inspection based network traffic classification
deep packet inspection
application signatures
network flows
Inspection
network management
Payloads
security monitoring
Complexity theory
quality of service
digital signatures
pattern matching
testing
pattern classification
pubcrawl
Resiliency
Protocols
telecommunication traffic
Scalability
biblio
Efficient Memristor-Based Architecture for Intrusion Detection and High-Speed Packet Classification
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
composability
deep packet inspection
hardware architectures
memristor crossbars
Metrics
network security
packet classification
power grid vulnerability analysis
pubcrawl
range matching
resilience
Resiliency
router
Snort
string matching
biblio
Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm
Submitted by grigby1 on Wed, 09/12/2018 - 11:25am
SIMD
Program processors
Programmable SoC
pubcrawl
real-time on-line pattern search
real-time systems
resilience
Resiliency
Scalability
search problems
platform based design methodologies
string matching
system monitoring
system-on-chip
SystemC
TCP
TCP packets
Xilinx Zynq programmable SoC
Zynq
High-Le'vel Synthesis
Algorithm design and analysis
BM string search algorithm
Boyer-Moore
Boyer-Moore algorithm
computer network security
deep packet inspection
FPGA
Hardware
high level synthesis
Accelerator
high-level synthesis
Inspection
MISD parallelism
Network Monitoring
network security
parallel processing
Payloads
Platform Based Design
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 9:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
Detection Of URL In Image Steganography
Submitted by grigby1 on Fri, 08/18/2017 - 2:11pm
composability
Image Steganography
Metrics
network coding
privacy
pubcrawl
security
steganalysis
Steganography
steganography detection
string matching
URL Detection
biblio
Memory-Efficient String Matching for Intrusion Detection Systems Using a High-Precision Pattern Grouping Algorithm
Submitted by grigby1 on Tue, 05/16/2017 - 12:26pm
composability
computer network security
deep packet inspection
Intrusion Detection Systems
Metrics
pubcrawl
Scalability
string matching
biblio
Node Configuration for the Aho-Corasick Algorithm in Intrusion Detection Systems
Submitted by grigby1 on Tue, 05/16/2017 - 12:26pm
Aho-Corasick algorithm
composability
Computing Theory
deep packet inspection
Deep Packet Inspection (DPI)
Intrusion Detection System (IDS)
Metrics
node configuration
pattern matching
pubcrawl
Scalability
Security Metrics
string matching
biblio
A 60Gbps DPI Prototype Based on Memory-Centric FPGA
Submitted by grigby1 on Tue, 05/16/2017 - 12:26pm
composability
deep packet inspection
dpi
hierarchical memory
Metrics
pubcrawl
Scalability
string matching
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 8:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
1
2
next ›
last »