Moving Network Protection from Software to Hardware: An Energy Efficiency Analysis
暂无分享,去创建一个
Altair Olivo Santin | Ricardo P. Jasinski | Volnei A. Pedroni | Andre Luiz Pereira de Franca | V. Pedroni | R. Jasinski | A. Santin
[1] Yu Chen,et al. A Survey on the Application of FPGAs for Network Infrastructure Security , 2011, IEEE Communications Surveys & Tutorials.
[2] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[3] Vinod Namboodiri,et al. Energy Consumption of Personal Computing Including Portable Communication Devices , 2011 .
[4] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[5] Rafael D. C. Santos,et al. Evaluation of data mining techniques for suspicious network activity classification using honeypots data , 2007, SPIE Defense + Commercial Sensing.
[6] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[7] William J. Kaiser,et al. Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed , 2011, CSET.
[8] Xuan Dau Hoang,et al. Data Mining Methods for Network Intrusion Detection , 2004 .
[9] Ioannis Papaefstathiou,et al. Power Consumption Estimations vs Measurements for FPGA-Based Security Cores , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.
[10] Joseph Migga Kizza,et al. Guide to Computer Network Security, 6th Edition , 2024, Texts in Computer Science.