Sciweavers

1098 search results - page 168 / 220
» Proactive Intrusion Detection
Sort
View
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
15 years 8 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
113
Voted
DATE
2008
IEEE
182views Hardware» more  DATE 2008»
15 years 8 months ago
An adaptable FPGA-based System for Regular Expression Matching
In many applications string pattern matching is one of the most intensive tasks in terms of computation time and memory accesses. Network Intrusion Detection Systems and DNA Seque...
Ivano Bonesana, Marco Paolieri, Marco D. Santambro...
109
Voted
ICCCN
2007
IEEE
15 years 8 months ago
Bloom Filter Accelerator for String Matching
— In this paper we present a hardware architecture for string matching. Our solution based on using a Bloom filter based pre-processor and a parallelized hashing engine is capab...
M. Nourani, P. Katta
ARC
2007
Springer
115views Hardware» more  ARC 2007»
15 years 7 months ago
Synthesis of Regular Expressions Targeting FPGAs: Current Status and Open Issues
This paper presents an overview regarding the synthesis of regular expressions targeting FPGAs. It describes current solutions and a number of open issues. Implementation of regula...
João Bispo, Ioannis Sourdis, João M....
ISMVL
2010
IEEE
164views Hardware» more  ISMVL 2010»
15 years 6 months ago
On the Number of Products to Represent Interval Functions by SOPs with Four-Valued Variables
Abstract—Let A and B be integers such that A ≤ B. An nvariable interval function is a mapping IN[n : A, B] : {0, 1}n → {0, 1}, where IN[n : A, B](X) = 1 iff A ≤ X ≤ B. Su...
Tsutomu Sasao