Author of the publication

An Efficient Pre-filter to Accelerate Regular Expression Matching.

, , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 111-119. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm., , , and . Future Gener. Comput. Syst., 27 (8): 1124-1134 (2011)Online Mining of Attack Models in IDS Alerts from Network Backbone by a Two-Stage Clustering Method., , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 104-116. Springer, (2013)An Event Grouping Approach for Infinite Stream with Differential Privacy., , , and . APSCC, volume 10065 of Lecture Notes in Computer Science, page 106-116. (2016)HPC: A Hierarchical Parameter Configuration Approach for Failure Detection Scheme in Application Layer Multicast., , and . CSO (1), page 680-685. IEEE Computer Society, (2009)Removing Key Escrow from the LW-HIBE Scheme., , , , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 593-605. Springer, (2015)A Loop-Based Key Management Scheme for Wireless Sensor Networks., , , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 103-114. Springer, (2007)Security evaluation of MISTY structure with SPN round function., , , and . Comput. Math. Appl., 65 (9): 1264-1279 (2013)Realizing Fine-Grained Inference of AS Path With a Generative Measurable Process., , , and . IEEE/ACM Trans. Netw., 31 (6): 3112-3127 (December 2023)A novel blockchain-based privacy-preserving framework for online social networks., , , , , and . Connect. Sci., 33 (3): 555-575 (2021)A new multistage approach to detect subtle DDoS attacks., , , and . Math. Comput. Model., 55 (1-2): 198-213 (2012)