Data De-duplication and Event Processing for Security Applications on an Embedded Processor
暂无分享,去创建一个
[1] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[2] George Varghese,et al. Automated Worm Fingerprinting , 2004, OSDI.
[3] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[4] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[5] Fred Douglis,et al. Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.
[6] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[7] Peter Deutsch,et al. ZLIB Compressed Data Format Specification version 3.3 , 1996, RFC.
[8] Jeffrey Harr,et al. Building Blocks , 2013 .
[9] F. Lemmermeyer. Error-correcting Codes , 2005 .
[10] R. Stapleton-Gray,et al. Rendering the Elephant: Characterizing Sensitive Networks for an Uncleared Audience , 2006, 2006 IEEE Information Assurance Workshop.
[11] Adam Stotz,et al. Situation Awareness of multistage cyber attacks by semantic event fusion , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[12] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[13] Calvin Chan,et al. CMPUT690 Term Project Fingerprinting using Polynomial (Rabin's method) , 2001 .
[14] W. W. Peterson,et al. Error-Correcting Codes. , 1962 .