1 |
Jun-Sang Park, Jin-Wan Park, Sung-Ho Yoon, Young-Suk Oh, Myung-Sub Kim.: Development of signature Generation system and verification network for application-level traffic classification. In: Conference of Korea Information Processing Society, Busan, Apr. 23-24, 2009, Vol.16, No. 1, pp. 1288-1291.
|
2 |
Subhabrata Sen, Oliver Spatscheck , Dongmei Wang.: Accurate, scalable in-network identification of p2p traffic using application signatures. In: World Wide Web 2004, May 17-20, 2004, New York, USA., 1999
|
3 |
F. Risso, M. Baldi, O. Morandi, A. Baldini, and P. Monclus.: Lightweight, Payload-Based Traffic Classification An Experimental Evaluation. In : IEEE International Conference on Communications, Beijing, China, May. 19-23, 2008, pp. 5869-5875.
|
4 |
Fnag Yu, Zhifeng Chen, Yanlei Dino, T. V. Lakshman, Randy H. Katz.: Fast and memory Efficient Regular Expression Matching for Deep Packet Inspection. In : ANCS 2006, December, 2006, San jose, California USA.
|
5 |
Christopher L. Hayes, Yan Luo.: DPICO: a high speed deep packet inspection engine using compact finite automata. In : ACM/IEEE Symposium on Architecture for networking and communications systems, December 03-04, 2007, Orlando, Florida, USA.
|
6 |
Liu, Hui Feng, Wenfeng Huang, Yongfeng Li, Xing.: Accurate Traffic Classification. In : Networking, Architecture, and Storage, NAS 2007. International Conference.
|
7 |
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein.: Introduction to Algorithms, Second Edition. In : MIT Press and McGraw-Hill, 2001. ISBN 0-262-03293-7. Chapter 32: String Matching, pp.906-932.
|
8 |
Byung-Chul Park, Young Won, Mi-Jung Choi, Myung-Sup Kim, and James W. Hong.: Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning. In : Proc. of the Asia-Pacific Network Operations and Management Symposium (APNOMS) 2008, LNCS5297, Beijing, China, Oct. 22-24, 2008, pp. 474-477.
|
9 |
G. Vasiliadis, M. Polychronakis, S. Antonatos, E. P. Markatos, and S. Ioannidis.: Regular expression matching on graphics hardware for intrusion detection. In : RAID, 2009, pp. 265-283.
|