Improved deep packet inspection in data stream detection
暂无分享,去创建一个
Jin Wang | Chunyong Yin | Ruxia Sun | Xiang Yin | Hongyi Wang | Hongyi Wang | Chunyong Yin | Jin Wang | Ruxia Sun | Xiang Yin
[1] Jason R. C. Nurse,et al. Baiting the hook: factors impacting susceptibility to phishing attacks , 2016, Human-centric Computing and Information Sciences.
[2] KeeganNathan,et al. A survey of cloud-based network intrusion detection analysis , 2016 .
[3] John W. Lockwood,et al. Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.
[4] Anne Brüggemann-Klein. Regular Expressions into Finite Automata , 1993, Theor. Comput. Sci..
[5] Jian Shen,et al. $$\varvec{\textit{KDVEM}}$$KDVEM: a $$k$$k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[6] Junjun Jiang,et al. Robust Feature Matching for Remote Sensing Image Registration via Locally Linear Transforming , 2015, IEEE Transactions on Geoscience and Remote Sensing.
[7] Lu Feng,et al. An improved Hoeffding-ID data-stream classification algorithm , 2015, The Journal of Supercomputing.
[8] H. Jonathan Chao,et al. Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection , 2012, IEEE/ACM Transactions on Networking.
[9] Bin Gu,et al. A Robust Regularization Path Algorithm for $\nu $ -Support Vector Classification , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[10] Jin Wang,et al. Improved clustering algorithm based on high-speed network data stream , 2018, Soft Comput..
[11] Ajay Kumar,et al. A Novel Algorithm for the Conversion of Parallel Regular Expressions to Non-deterministic Finite Automata , 2014 .
[12] Dan Chia-Tien Lo,et al. Space Optimization on Counters for FPGA-Based Perl Compatible Regular Expressions , 2009, TRETS.
[13] Patrick Crowley,et al. Extending finite automata to efficiently match Perl-compatible regular expressions , 2008, CoNEXT '08.
[14] Jin Wang,et al. Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Mod-ulation Classification , 2018 .
[15] Yun Lin,et al. Semi-Supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification , 2018 .
[16] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[17] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[18] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[19] Bin Li,et al. An enhanced fall detection system for elderly person monitoring using consumer home networks , 2014, IEEE Transactions on Consumer Electronics.
[20] Dong Hyun Jeong,et al. A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.
[21] Chunyong Yin,et al. Parallel implementing improved k-means applied for image retrieval and anomaly detection , 2017, Multimedia Tools and Applications.
[22] Jin Wang,et al. Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[23] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[24] Lucas Vespa,et al. Deterministic finite automata characterization and optimization for scalable pattern matching , 2011, TACO.
[25] R. Sherratt,et al. Adversarial learning for distant supervised relation extraction , 2018 .
[26] T. V. Lakshman,et al. Fast and memory-efficient regular expression matching for deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.
[27] V. Krishna Reddy,et al. NDynamic Framework for Secure VM Migration over Cloud Computing , 2017, J. Inf. Process. Syst..
[28] Patrick Crowley,et al. A hybrid finite automaton for practical deep packet inspection , 2007, CoNEXT '07.
[29] Tinghuai Ma,et al. KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.
[30] Xingming Sun,et al. Structural Minimax Probability Machine , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[31] Mohammed Farik,et al. Intrusion Detection & Prevention Systems - Sourcefire Snort , 2016 .