Author of the publication

Applying Fast String Matching to Intrusion Detection

, and . Los Alamos National Laboratory, University of California San Diego, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional proofs of self-stabilizing protocols.. WSS, page 80-94. Carleton University Press, (1997)The complexity of object reconciliation, and open problems related to set difference and coding., and . Allerton Conference, page 1126-1132. IEEE, (2012)Revelio: ML-Generated Debugging Queries for Distributed Systems., , , , , and . CoRR, (2021)Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow., , and . MICRO, page 209-220. IEEE Computer Society, (2004)Self-Stabilization by Counter Flushing.. SIAM J. Comput., 30 (2): 486-510 (2000)Real time network policy checking using header space analysis, , , , , and . Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation, page 99--112. Berkeley, CA, USA, USENIX Association, (2013)Automated measurement of high volume traffic clusters., , and . Internet Measurement Workshop, page 177-178. ACM, (2002)Self-Stabilization by Window Washing., and . PODC, page 35-44. ACM, (1996)Crash Failures can Drive Protocols to Arbitrary States., and . PODC, page 247-256. ACM, (1996)Hash-Based Techniques for High-Speed Packet Processing., , and . Algorithms for Next Generation Networks, Springer, (2010)