|
[1] M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Pers. Com- mun. Mag., vol. 8, pp. 10–17, August 2001. [2] Martin Roesch, “Snort-lightweight intrusion detection for networks,” in USENIX Sys- tems Administration Conference Proceedings, November 1999, pp. 229–238. [3] Vern Paxson, “Bro : a system for detecting network intruders in real-time,” Computer Networks, vol. 31, pp. 2435–2463, 1999. [4] Ricardo Koller, Raju Rangaswami, Joseph Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. Masoud Sadjadi, Tao Li, and Krista Merrill, “Anatomy of a Real-time Intrusion Prevention System,” in International Conference on Autonomic Computing, June 2008, pp. 151–160. [5] Zachary K. Baker and Viktor K. Prasanna, “Time and Area Efficient Pattern Matching on FPGAs,” in international symposium on Field programmable gate arrays, February 2004, pp. 223–232. [6] Chris Clark, Wenke Lee, David Schimmel, Didier Contis, Mohamed Kone, and Ashley Thomas, “A Hardware Platform for Network Intrusion Detection and Prevention,” in Proceedings of Workshop on Network Processors and Applications (NP3), 2004, pp. 136–145. [7] Zachary K. Baker and Viktor K. Prasanna, “High-throughput Linked-Pattern Matching for Intrusion Detection Systems,” in Symposium on Architecture for networking and communications systems, October 2005, pp. 193–202. [8] Sarang Dharmapurikar and John Lockwood, “Fast and Scalable Pattern Matching for Content Filtering,” in Symposium on Architecture for networking and communications systems, October 2005, pp. 183–192. [9] Abhishek Mitra,Walid Najjar and Laxmi Bhuyan, “Compiling PCRE to FPGA for Accel- erating SNORT IDS,” in Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems, 2007, pp. 127–136. [10] Yaron Weinsberg, Shimrit Tzur-David, Danny Dolev and Tal Anker, “One Algorithm to Match Them All: On a Generic NIPS Pattern Matching Algorithm,” in Workshop on High Performance Switching and Routing, June 2007, pp. 1–6. [11] Young H. Cho and William H. Mangione-Simth, “Deep Network Packet Filter Design for Reconfigurable Devices,” ACM Transactions on Embedded Computing Systems, vol. 7, February 2008. [12] Robin Sommer, Vern Paxson and Nicholas Weaver, “An architecture for exploiting multi- core processors to parallelize network intrusion prevention,” in Proceedings of the IEEE Sarnoff Symposium, May 2007. [13] Chun-Ying Huang, Chi-Ming Chen, Shu-Ping Yu, Sheng-Yao Hsu and Chih-Hung Lin, “Accelerate In-Line Packet Processing Using Fast Queue,” in TENCON, 2010, pp. 1048–1052. [14] K. Salah and A. Kahtani, “Improving Snort performance under Linux,” IET Commu- nications, vol. 3, pp. 1883–1895, December 2009. [15] Edgar Reich, “Waiting Times When Queues are in Tandem,” Annals of Mathematical Statistics, vol. 28, pp. 768–773, 1957. [16] S.M.R. Iravani, M.J.M. Posner and J.A. Buzacott, “A two-stage tandem queue attended by a moving server with holding and switching costs,” Queueing Systems, vol. 26, no. 3-4, pp. 203–228, 1997. [17] Izak Duenyas, Diwakar Gupta and Tava Lennon Olsen, “Control of a Single-Server Tandem Queueing System with Setups,” Operations Research, vol. 46, no. 2, pp. 218–230, Mar. - Apr. 1998. [18] Werner Sandmann, “Delays in a Series of Queues: Independent versus Identical Service Times,” in IEEE Symposium on Computers and Communications (ISCC), June 2010, pp. 32–37. [19] Orathai Sukwong, Hyong Kim and James Hoe, “Commercial Antivirus Software Effec- tiveness: An Empirical Study,” Computer, vol. 44, no. 3, pp. 63–70, March 2011. [20] Deepak Venugopal and Guoning Hu, “Efficient signature based malware detection on mobile devices,” Mobile Information Systems, vol. 4, no. 1, pp. 33–49, 2008. [21] Liu, Alex X. and Gouda, Mohamed G., “Diverse Firewall Design,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, pp. 1237–1251, September 2008. [22] Huazhong, Li Zhitang and Wu Junqi, “A Novel Network Intrusion Detection System (NIDS) Based on Signatures Search of Data Mining,” in First International Workshop on Knowledge Discovery and Data Mining, January 2008, pp. 10–16. [23] P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, “Anomaly- based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers and Security, vol. 28, pp. 18–28, 2009. [24] Leland, W.E., Taqqu, M.S., Willinger, W. and Wilson, D.V., “On the self-similar nature of Ethernet traffic (extended version),” IEEE/ACM Transactions on Networking, vol. 2, pp. 1–15, February 1994. [25] Vern Paxson and Sally Floyd, “Wide area traffic: the failure of Poisson modeling,” IEEE/ACM Transactions on Networking (TON), vol. 3, pp. 226–244, June 1995. [26] Crovella, M.E. and Bestavros, A., “Self-similarity in World Wide Web traffic: evidence and possible causes,” IEEE/ACM Transactions on Networking, vol. 5, pp. 835–846, December 1997. [27] Donald Gross, John F. Shortle, James M. Thompson, and Carl M. Harris, Fundamentals of Queueing Theory (Fourth Edition). WILEY, 2008.
|