Author of the publication

A Network Processor-Based Fault-Tolerance Architecture for Critical Network Equipments.

, , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 763-772. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Non-Computational Intensive Pre-filter for Pattern Matching in Network Intrusion Detection Systems., , , , , , and . GLOBECOM, IEEE, (2006)A pattern matching coprocessor for deep and large signature set in network security system., , , and . GLOBECOM, page 5. IEEE, (2005)A fast pattern matching algorithm for network processor-based intrusion detection system., , , and . IPCCC, page 271-275. IEEE, (2004)Apply Data Mining to Defense-in-Depth Network Security System., , , , and . AINA, page 159-162. IEEE Computer Society, (2005)A fast string-matching algorithm for network processor-based intrusion detection system., , , and . ACM Trans. Embed. Comput. Syst., 3 (3): 614-633 (2004)A novel software-based MD5 checksum lookup scheme for anti-virus systems., , and . IWCMC, page 207-212. IEEE, (2011)On the design of a cost effective network security switch architecture., , , , and . GLOBECOM, page 5. IEEE, (2005)FTSE: The FNP-Like TCAM Searching Engine., , , , and . ISCC, page 863-868. IEEE Computer Society, (2005)Construct Efficient Hyper-alert Correlation for Defense-in-Depth Network Security System., , , , and . ICOIN, volume 3090 of Lecture Notes in Computer Science, page 886-894. Springer, (2004)Fast proxyless stream-based anti-virus for Network Function Virtualization., , , , , and . NetSoft, page 1-5. IEEE, (2015)