共 27 条
- [1] Song H., Lockwood J.W., Efficient packet classification for network intrusion detection using FPGA, Proc. of the 13th Int'l Symp. on Field-Programmable Gate Arrays, pp. 238-245, (2005)
- [2] Baker Z.K., Prasanna V.K., A methodology for synthesis of efficient intrusion detection systems on FPGAs, Proc. of the 12th Annual IEEE Symp. on Field-Programmable Custom Computing Machines, pp. 135-144, (2004)
- [3] Tian D.X., Liu Y.H., Li Y.L., Tang Y., Fast matching algorithm and conflict detection for packet filter rules, Journal of Computer Research and Development, 42, 7, pp. 1128-1135, (2005)
- [4] Tuck N., Sherwood T., Calder B., Varghese G., Deterministic memory-efficient string matching algorithms for intrusion detection, Proc. of the 23rd Conf. of the IEEE Communications Society, pp. 2628-2639, (2004)
- [5] Tan L., Sherwood T., A high throughput string matching architecture for intrusion detection and prevention, Proc. of the 32nd Int'l Symp. on Computer Architecture, pp. 112-122, (2005)
- [6] Mukkamala S., Sung A.H., Abraham A., Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications, 28, 2, pp. 167-182, (2005)
- [7] Lee H., Chung Y., Park D., An adaptive intrusion detection algorithm based on clustering and kernel-method, Proc. of the 10th Pacific-Asia Conf. on Knowledge Discovery and Data Mining, pp. 603-610, (2006)
- [8] Xu X., Wang X., An adaptive network intrusion detection method based on PCA and support vector machines, Proc. of the 1st Int'l Conf. on Advanced Data Mining and Applications, pp. 696-703, (2005)
- [9] Aggarwal C.C., Yu P.S., An effective and efficient algorithm for high-dimensional outlier detection, The Int'l Journal on Very Large Data Bases, 14, 2, pp. 211-221, (2005)
- [10] Rawat S., Pujari A.K., Gulati V.P., On the use of singular value decomposition for a fast intrusion detection system, Electronic Notes in Theoretical Computer Science, 142, 3, pp. 215-228, (2006)