Exploiting Reconfigurable Hardware for Network Security.
Shaomeng LiJim TørresenOddvar SøråsenPublished in: FCCM (2003)
Keyphrases
- network security
- reconfigurable hardware
- intrusion detection
- intrusion detection system
- low cost
- computer networks
- traffic analysis
- hardware software
- anomaly detection
- fine grain
- network traffic
- information security
- evolvable hardware
- hardware implementation
- image processing
- data mining
- pattern recognition
- functional units
- computer vision
- processing elements
- evolutionary algorithm