Author of the publication

On the fly pattern matching for intrusion detection with Snort.

, , and . Ann. des Télécommunications, 59 (9-10): 1045-1071 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Matching a Set of Strings with Variable Length Don't Cares., and . CPM, volume 937 of Lecture Notes in Computer Science, page 230-247. Springer, (1995)One-variable context-free hedge automata., and . J. Comput. Syst. Sci., (2019)Rewrite based Verification of XML Updates, and . CoRR, (2009)Any Gound Associative-Commutative Theory Has a Finite Canonical System., and . RTA, volume 488 of Lecture Notes in Computer Science, page 423-434. Springer, (1991)On Word Problems in Horn Theories., and . CADE, volume 310 of Lecture Notes in Computer Science, page 527-537. Springer, (1988)A Proof System for Conditional Algebraic Specifications., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 51-63. Springer, (1990)Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption., , , and . ACM Trans. Comput. Log., 9 (4): 24:1-24:52 (2008)Reasoning with Conditional Axioms., and . Ann. Math. Artif. Intell., 15 (2): 125-149 (1995)Matching a Set of Strings with Variable Length don't Cares., and . Theor. Comput. Sci., 178 (1-2): 129-154 (1997)Preferring diagnoses by abduction., , and . IEEE Trans. Syst. Man Cybern., 23 (3): 792-808 (1993)