Deep packet inspection optimizes mobile applications

被引:0
|
作者
Coward, Mike [1 ]
机构
[1] California Institute of Technology, Pasadena, CA, United States
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:37 / 40
相关论文
共 50 条
  • [41] BlindBox: Deep Packet Inspection over Encrypted Traffic
    Sherry, Justine
    Lan, Chang
    Popa, Raluca Ada
    Ratnasamy, Sylvia
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 213 - 226
  • [42] Cost Analysis of Deep Packet Inspection in PCC Architecture
    Lin, Chuan-Sheng
    Sou, Sok-Ian
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1499 - 1507
  • [43] Deep packet inspection using parallel bloom filters
    Dharmapurikar, S
    Krishnamurthy, P
    Sproull, T
    Lockwood, J
    HOT INTERCONNECTS 11, 2003, : 44 - 51
  • [44] Deep Packet Inspection using Finate State Machines
    Krishna, B. Murali
    Sankar, G. N. V. Siva
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOLUME II, 2009, : 635 - 645
  • [45] BlindBox: Deep Packet Inspection over Encrypted Traffic
    Sherry, Justine
    Lan, Chang
    Popa, Raluca Ada
    Ratnasamy, Sylvia
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 213 - 226
  • [46] DPI & DFI: a Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection
    Guo, Yu -tong
    Gao, Yang
    Wang, Yan
    Qin, Meng-yuan
    Pu, Yu-jie
    Wang, Zeng
    Liu, Dan-dan
    Chen, Xiang-jun
    Gao, Tian-fng
    Lv, Ting-ting
    Fu, Zhong-chuan
    13TH GLOBAL CONGRESS ON MANUFACTURING AND MANAGEMENT, 2017, 174 : 1309 - 1314
  • [47] Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection
    Aurora, Victor
    Neal, Christopher
    Proulx, Alexandre
    Cuppens, Nora Boulahia
    Cuppens, Frederic
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 53 - 68
  • [48] Hardware acceleration of regular expression repetitions in deep packet inspection
    Cronin, Brendan
    Wang, Xiaojun
    IET INFORMATION SECURITY, 2013, 7 (04) : 327 - 335
  • [49] Automatically Mining Application Signatures for Lightweight Deep Packet Inspection
    Lu Gang
    Zhang Hongli
    Zhang Yu
    Qassrawi, Mahmoud T.
    Yu Xiangzhan
    Peng Lizhi
    CHINA COMMUNICATIONS, 2013, 10 (06) : 86 - 99
  • [50] Towards Efficient Privacy-Preserving Deep Packet Inspection
    Wang, Weicheng
    Lee, Hyunwoo
    Huang, Yan
    Bertino, Elisa
    Li, Ninghui
    COMPUTER SECURITY - ESORICS 2023, PT II, 2024, 14345 : 166 - 192