Sciweavers

2236 search results - page 118 / 448
» Intrusion detection techniques and approaches
Sort
View
DAC
2007
ACM
15 years 11 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
USENIX
2008
15 years 13 days ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
LISA
2008
15 years 13 days ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
81
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Finding curves in SAR CCD images
This paper introduces a pattern recognition and computer vision approach to mitigating false alarms in synthetic aperture radar (SAR) coherence change detection (CCD) images. In t...
Miriam Cha, Rhonda Phillips, Michael Yee
CSUR
2004
149views more  CSUR 2004»
14 years 10 months ago
A review of vessel extraction techniques and algorithms
Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put ...
Cemil Kirbas, Francis K. H. Quek