Victor C. Valgenti

According to our database1, Victor C. Valgenti authored at least 18 papers between 2010 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security.
IEICE Trans. Inf. Syst., 2018

2017
Simulating Exploits for the Creation and Refinement of Detection Signatures.
Proceedings of the 25th IEEE International Symposium on Modeling, 2017

2016
Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems.
IEICE Trans. Inf. Syst., 2016

2015
A highly deterministic hashing scheme using bitmap filter for high speed networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

REduce: Removing Redundancy from Regular Expression Matching in Network Security.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow Processing.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Increasing Diversity in Network Intrusion Detection System Evaluation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
TCAM-based classification using divide-and-conquer for range expansion.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A hierarchical hashing scheme to accelerate longest prefix matching.
Proceedings of the IEEE Global Communications Conference, 2014

Protecting Run-Time Filters for Network Intrusion Detection Systems.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2012
An application-level content generative model for network applications.
Proceedings of the International ICST Conference on Simulation Tools and Techniques, 2012

GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
Simulating content in traffic for benchmarking intrusion detection systems.
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Real-time Netshuffle: Graph distortion for on-line anonymization.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

NFA-Based Pattern Matching for Deep Packet Inspection.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Netshuffle: Improving Traffic Trace Anonymization through Graph Distortion.
Proceedings of IEEE International Conference on Communications, 2011

TrustGuard: A flow-level reputation-based DDoS defense system.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Hybrid Regular Expression Matching for Deep Packet Inspection on Multi-Core Architecture.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010


  Loading...