|
Search the dblp DataBase
Chia-Nan Kao:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin
Apply Data Mining to Defense-in-Depth Network Security System. [Citation Graph (0, 0)][DBLP] AINA, 2005, pp:159-162 [Conf]
- Nen-Fu Huang, Ying-Tsuen Chen, Yi-Chung Chen, Chia-Nan Kao, Joe Chiou
A Network Processor-Based Fault-Tolerance Architecture for Critical Network Equipments. [Citation Graph (0, 0)][DBLP] ICOIN, 2004, pp:763-772 [Conf]
- Nen-Fu Huang, Hsien-Wei Hung, Chia-Nan Kao, Gin-Yuan Jai, Yi-Ju Sung
Construct Efficient Hyper-alert Correlation for Defense-in-Depth Network Security System. [Citation Graph (0, 0)][DBLP] ICOIN, 2004, pp:886-894 [Conf]
- Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Chang Shih, Nen-Fu Huang
FTSE: The FNP-Like TCAM Searching Engine. [Citation Graph (0, 0)][DBLP] ISCC, 2005, pp:863-868 [Conf]
- Rong-Tai Liu, Nen-Fu Huang, Chia-Nan Kao, Chih-Hao Chen, Chi-Chieh Chou
A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:97-101 [Conf]
- Rong-Tai Liu, Nen-Fu Huang, Chih-Hao Chen, Chia-Nan Kao
A fast string-matching algorithm for network processor-based intrusion detection system. [Citation Graph (0, 0)][DBLP] ACM Trans. Embedded Comput. Syst., 2004, v:3, n:3, pp:614-633 [Journal]
- Nen-Fu Huang, Yen-Ming Chu, Yih-Jou Tzang, Jian-Lin Chen, Hsien-Wei Hun, Ming-Chang Shih, Chia-Nan Kao
A Non-Computational Intensive Pre-filter for Pattern Matching in Network Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
Search in 0.001secs, Finished in 0.002secs
|