Author of the publication

Backtracking Algorithmic Complexity Attacks against a NIDS.

, , and . ACSAC, page 89-98. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A general constraint-centric scheduling framework for spatial architectures., , , , , and . PLDI, page 495-506. ACM, (2013)New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice., and . ACM Trans. Comput. Syst., 21 (3): 270-313 (2003)Memory processing units., , , , and . Hot Chips Symposium, page 1. IEEE, (2014)XFA: Faster Signature Matching with Extended Automata., , and . SP, page 187-201. IEEE Computer Society, (2008)Netpy: Advanced Network Traffic Monitoring., , , , and . INCoS, page 253-254. IEEE Computer Society, (2009)LEAP: latency- energy- and area-optimized lookup pipeline., , , , and . ANCS, page 175-186. ACM, (2012)Counting the number of active flows on a high speed link., , and . Comput. Commun. Rev., 32 (3): 10 (2002)The measurement manifesto., and . Comput. Commun. Rev., 34 (1): 9-14 (2004)Multi-byte Regular Expression Matching with Speculation., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 284-303. Springer, (2009)Bitmap algorithms for counting active flows on high-speed links., , and . IEEE/ACM Trans. Netw., 14 (5): 925-937 (2006)