Lê Đắc Nhường, Nguyễn Gia Như, Lê Đăng Nguyên, Lê Trọng Vĩnh

Main Article Content

Abstract

Tóm tắt:

References

Hwang, K., Briggs, F. Computer Architecture
and Parallel Processing. McGrawHill, Inc.
New York, NY, 1990.
12] Quammen, C. Introduction to Programming
Shared-Memory and Distibuted Memory
Parallel Computers. ACM Crossroad, Student
Edition,2000.
t3l B. Mul,rherjee, H. Heberlein, and K. Levitt,
Network intrusion detection, IEEE Network,
vol. 8, no. 3 (1994)26.
t4] H. Debar, M. Dacier, A. Wespi, Towards a
taxonomy of intrusion-detection systems,
Computer Networks, 31 (1999) 805.
tsl Kedar Namjoshi vi Girija Narlikar, Robust and
Fast Pattern Matching For Intrusion Deteclion,
INFOCOM 2010.
t6] M. Roesch, Snort: Lightweight intrusion
detection for networks, Proc. of the 1999
USENX LISA Systems Administration
Conference, 1999.
Christian Charras, The.ry Lecroq, Handbook of
Exact String Matching Algorithms, King's
College Publications, 2004.
Jianming Yu and Jun Li, A Parallel NIDS
Pattern Matching Engine and hs
Implementation on Network Processor, Proc. of
the 2005 International Conference on Security
and Management (SAM), 2005.
Ranjit Noronha and D.K. Panda. "Improving
Scalability of OpenMP Applications on Multicore
Systems Using Large Page Supporf',2007.
Jianming Yu, Quan Huang, and Yibo Xue,
Optimizing Multi-thread String Matching for Network Processor-Based Intrusion
Managemenl Syslem, Conference on
Communication Network and Information
Security (CNIS), 2006.