Cited By
View all- Aldwairi MAlshboul MSeyam A(2018)Characterizing Realistic Signature-based Intrusion Detection BenchmarksProceedings of the 6th International Conference on Information Technology: IoT and Smart City10.1145/3301551.3301591(97-103)Online publication date: 29-Dec-2018
- Li JPeng HYang EHu CZhong SWang L(2018)Eagle+Future Generation Computer Systems10.1016/j.future.2017.02.00280:C(275-285)Online publication date: 1-Mar-2018
- Tsai HYang KPeng YLin CTsao YChang MChen T(2015)Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPIProceedings of the 52nd Annual Design Automation Conference10.1145/2744769.2744836(1-6)Online publication date: 7-Jun-2015
- Show More Cited By