دانلود رایگان مقالات ISI با ترجمه فارسی

دانلود رایگان مقالات انگلیسی ISI برای رشته های مدیریت، حسابداری، کامپیوتر، مهندسی برق، اقتصاد، کشاورزی، پزشکی، عمران، معماری و سایر رشته ها از نشریات معتبر همچون الزویر، امرالد، اسپرینگر، IEEE به همراه ترجمه فارسی

دانلود رایگان مقالات ISI با ترجمه فارسی

دانلود رایگان مقالات انگلیسی ISI برای رشته های مدیریت، حسابداری، کامپیوتر، مهندسی برق، اقتصاد، کشاورزی، پزشکی، عمران، معماری و سایر رشته ها از نشریات معتبر همچون الزویر، امرالد، اسپرینگر، IEEE به همراه ترجمه فارسی

دانلود رایگان مقاله انگلیسی درباره الگوریتم‌ تطبیق رشته‌ برای امنیت شبکه با ترجمه فارسی

عنوان فارسی مقاله:

مروری بر استفاده از الگوریتم‌ های تطبیق رشته‌ ای برای امنیت شبکه

عنوان انگلیسی مقاله:

A Survey on using String Matching Algorithms for Network Security


برای دانلود رایگان مقاله انگلیسی مروری بر استفاده از الگوریتم‌ های تطبیق رشته‌ ای برای امنیت شبکه با فرمت پی دی اف و خرید ترجمه فارسی آن با فرمت ورد اینجا کلیک نمایید

  

کلمات کلیدی :


New pattern matching algorithms for network security applications https://rucore.libraries.rutgers.edu/rutgers-lib/40740/ by L Yang - ‎2013 - ‎Related articles DescriptionModern network security applications, such as network-based intrusion detection systems (NIDS) and firewalls, routinely employ deep packet inspection to identify malicious traffic. ... The pattern matching algorithms employed for deep packet inspection must satisfy two requirements. [PDF]Techniques Used in String Matching for Network Security waset.org/publications/.../techniques-used-in-string-matching-for-network-security by J Bhandari - ‎Cited by 1 - ‎Related articles In this area the effectiveness and efficiency of string matching algorithms is important for applications in network security such as network intrusion detection, virus detection, signature matching and web content filtering system. ... String matching is a widely used concept for network security. [PDF]Network Security Based On Pattern Matching - International Journal of ... paper.ijcsns.org/07_book/200810/20081048.pdf by MRVK PACHGHARE - ‎2008 - ‎Cited by 4 - ‎Related articles Oct 5, 2008 - The security of computer networks plays a strategic role in modern ... This paper proposes a pattern matching algorithm which overcomes the ... [PDF]profiling and accelerating string matching algorithms in three network ... speed.cis.nctu.edu.tw/~ydlin/profile06.pdf by POC LIN - ‎Cited by 34 - ‎Related articles This work reviews existing string matching algorithms and their applications in network content security. The character- istics of signatures in three typical open ... Exact and like string matching algorithm for web and network security ... ieeexplore.ieee.org/document/6618726/ by AM Alshahrani - ‎2013 - ‎Cited by 4 - ‎Related articles String matching algorithms look for one, or more generally, all the occurrences of a search string in an input string. The most efficient string-matching a. Memory Efficient String Matching Algorithm for Network ... - IEEE Xplore ieeexplore.ieee.org/iel5/5971803/6071785/06071800.pdf by J Yu - ‎2007 - ‎Cited by 19 - ‎Related articles This paper presents a memory and time efficient string matching algorithm specifically designed for ... fundamental security applications that are growing in. Exact and Like String Matching Algorithm for Web and Network Security ieeexplore.ieee.org/iel7/6601034/6618649/06618726.pdf?arnumber=6618726 Exact and Like String Matching Algorithm for Web and Network Security. Ali M. Alshahrani. University of Essex. Colchester, UK amsals@essex.ac.uk. M..I. Khalil. [PDF]string matching application for network security - IJCSE www.ijcse.net/docs/IJCSE13-02-05-015.pdf by J Bhandari - ‎Related articles Abstract - String matching is one of the key of network security, biological ... string matching algorithms, highlights their application on network content security ... [PDF]A Pattern Matching Co-processor for Network Security www.isi.edu/~youngcho/pub/dac05.pdf by YH Cho - ‎2005 - ‎Cited by 100 - ‎Related articles Keywords. Network security, Intrusion, Pattern matching, Pattern search,. Snort. 1. ... algorithms to map all the patterns defined in the Snort rules into the design. High Performance Pattern Matching Algorithm for Network Security https://www.researchgate.net/.../267953678_High_Performance_Pattern_Matching_Alg... Many network security applications rely on pattern matching to extract the threat from network traffic. The increase in network speed and traffic may make existing ...