Network Intrusion Detection and Prevention Systems (NIDPS) are important elements of network security. Their role is to monitor internet traffic for malicious content and, on detection, generate an alert message and/or block the offending traffic. Potential attacks are described in a database of rules known as the rule set, where each rule consists of an IP header part and a payload signature part. The payload signature can be in the form of a fixed string and/or regular expression. This thesis studies the three main stages of these systems, namely TCP/IP reassembly, multi-match header matching and Deep Packet Inspection (DPI).\ud TCP/IP reassembly is a necessary prerequisite to DPI as attack patterns may span more than one IP fragment or T...
An improved approach of image forgery detection, specifically image splicing detection with Constrai...
Understanding dynamic phenomena in systems powered by thin-film batteries can be valuable for proper...
The quest for improving processing power and efficiency is spawning research into many-core systems ...
This thesis focuses on the design of new algorithms and energy efficient high throughput hardware ac...
University of Technology Sydney. Faculty of Engineering and Information Technology.Bandwidth is one ...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Combinatorial testing has been an active research area in recent years. One challenge in this area ...
Internet-of-Things connects every ‘thing’ with the Internet and allows these ‘things’ to communicate...
Network applications become increasingly computation-intensive and the amount of traffic soars unpre...
Contact centres are the first point of contact between a company and a customer after the purchase o...
Defense against Distributed Denial of Service (DDoS) attacks is one of the primary concerns on the I...
Over the last two decades, Design for Manufacturing (DFM) has emerged as an essential field within t...
Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secur...
Computer Networks are being used increasingly around the world. More importantly, many of these netw...
This thesis presents a clockless stochastic low-density parity-check (LDPC) decoder implemented on...
An improved approach of image forgery detection, specifically image splicing detection with Constrai...
Understanding dynamic phenomena in systems powered by thin-film batteries can be valuable for proper...
The quest for improving processing power and efficiency is spawning research into many-core systems ...
This thesis focuses on the design of new algorithms and energy efficient high throughput hardware ac...
University of Technology Sydney. Faculty of Engineering and Information Technology.Bandwidth is one ...
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware distribution. C...
Combinatorial testing has been an active research area in recent years. One challenge in this area ...
Internet-of-Things connects every ‘thing’ with the Internet and allows these ‘things’ to communicate...
Network applications become increasingly computation-intensive and the amount of traffic soars unpre...
Contact centres are the first point of contact between a company and a customer after the purchase o...
Defense against Distributed Denial of Service (DDoS) attacks is one of the primary concerns on the I...
Over the last two decades, Design for Manufacturing (DFM) has emerged as an essential field within t...
Scaling big data infrastructure using multi-cloud environment has led to the demand for highly secur...
Computer Networks are being used increasingly around the world. More importantly, many of these netw...
This thesis presents a clockless stochastic low-density parity-check (LDPC) decoder implemented on...
An improved approach of image forgery detection, specifically image splicing detection with Constrai...
Understanding dynamic phenomena in systems powered by thin-film batteries can be valuable for proper...
The quest for improving processing power and efficiency is spawning research into many-core systems ...