Sciweavers

2945 search results - page 66 / 589
» Designing and Implementing Malicious Hardware
Sort
View
RAID
2009
Springer
15 years 10 months ago
Regular Expression Matching on Graphics Hardware for Intrusion Detection
The expressive power of regular expressions has been often exploited in network intrusion detection systems, virus scanners, and spam filtering applications. However, the flexibl...
Giorgos Vasiliadis, Michalis Polychronakis, Spyros...
MATA
2005
Springer
169views Communications» more  MATA 2005»
15 years 9 months ago
Facilitating Context-Awareness Through Hardware Personalization Devices: The Simplicity Device
Abstract. The paper presents the specification, development and initial performance evaluation of the Simplicity Device (SD), which is one of the key components of the SIMPLICITY A...
J. Papanis, Sofia Kapellaki, Eleftherios Koutsolou...
SIGCOMM
2010
ACM
15 years 4 months ago
SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware
We present SwitchBlade, a platform for rapidly deploying custom protocols on programmable hardware. SwitchBlade uses a pipeline-based design that allows individual hardware module...
Muhammad Bilal Anwer, Murtaza Motiwala, Muhammad M...
ACMSE
2006
ACM
15 years 6 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
ICCCN
2008
IEEE
15 years 10 months ago
A Structured Hardware/Software Architecture for Embedded Sensor Nodes
—Owing to the limited requirement for sensor processing in early networked sensor nodes, embedded software was generally built around the communication stack. Modern sensor nodes...
Geoff V. Merrett, Alex S. Weddell, Nick R. Harris,...