Protomatching network traffic for high throughputnetwork intrusion detection. Rubin, S., Jha, S., & Miller, B. P. In Proceedings of ACM Conference on Computer and Communications Security, pages 47-58, 2006. Paper bibtex @inproceedings{ dblp3093586,
title = {Protomatching network traffic for high throughputnetwork intrusion detection},
author = {Shai Rubin and Somesh Jha and Barton P. Miller},
author_short = {Rubin, S. and Jha, S. and Miller, B. P.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2006},
key = {dblp3093586},
id = {dblp3093586},
biburl = {http://www.dblp.org/rec/bibtex/conf/ccs/RubinJM06},
url = {http://doi.acm.org/10.1145/1180405.1180413},
conference = {ACM Conference on Computer and Communications Security},
pages = {47-58},
text = {ACM Conference on Computer and Communications Security 2006:47-58},
booktitle = {Proceedings of ACM Conference on Computer and Communications Security}
}
Downloads: 0
{"_id":"hCcZYkqBLLhZBGQBQ","bibbaseid":"rubin-jha-miller-protomatchingnetworktrafficforhighthroughputnetworkintrusiondetection-2006","downloads":0,"creationDate":"2014-12-14T05:19:29.996Z","title":"Protomatching network traffic for high throughputnetwork intrusion detection","author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"year":2006,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/ccs/RubinJM06","bibdata":{"title":"Protomatching network traffic for high throughputnetwork intrusion detection","author":["Shai Rubin","Somesh Jha","Barton P. Miller"],"author_short":["Rubin, S.","Jha, S.","Miller, B. P."],"bibtype":"inproceedings","type":"inproceedings","year":"2006","key":"dblp3093586","id":"dblp3093586","biburl":"http://www.dblp.org/rec/bibtex/conf/ccs/RubinJM06","url":"http://doi.acm.org/10.1145/1180405.1180413","conference":"ACM Conference on Computer and Communications Security","pages":"47-58","text":"ACM Conference on Computer and Communications Security 2006:47-58","booktitle":"Proceedings of ACM Conference on Computer and Communications Security","bibtex":"@inproceedings{ dblp3093586,\n title = {Protomatching network traffic for high throughputnetwork intrusion detection},\n author = {Shai Rubin and Somesh Jha and Barton P. Miller},\n author_short = {Rubin, S. and Jha, S. and Miller, B. P.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2006},\n key = {dblp3093586},\n id = {dblp3093586},\n biburl = {http://www.dblp.org/rec/bibtex/conf/ccs/RubinJM06},\n url = {http://doi.acm.org/10.1145/1180405.1180413},\n conference = {ACM Conference on Computer and Communications Security},\n pages = {47-58},\n text = {ACM Conference on Computer and Communications Security 2006:47-58},\n booktitle = {Proceedings of ACM Conference on Computer and Communications Security}\n}","bibbaseid":"rubin-jha-miller-protomatchingnetworktrafficforhighthroughputnetworkintrusiondetection-2006","role":"author","urls":{"Paper":"http://doi.acm.org/10.1145/1180405.1180413"},"downloads":0},"search_terms":["protomatching","network","traffic","high","throughputnetwork","intrusion","detection","rubin","jha","miller"],"keywords":[],"authorIDs":[],"dataSources":["i4Bk5nm8w35DJzsHD"]}