Vol., No., Article Title Authors Date Journal/Conference Name - - PowerPoint PPT Presentation

vol no article title authors date journal conference name
SMART_READER_LITE
LIVE PREVIEW

Vol., No., Article Title Authors Date Journal/Conference Name - - PowerPoint PPT Presentation

Vol., No., Article Title Authors Date Journal/Conference Name / Pages Vol. 2 , Password Memorability and Security A. Blackwell, R. Anderson, Sept.-Oct. 1 2020/06/01 Issue 5 , 25 - IEEE Security


slide-1
SLIDE 1

1 2020/06/01 Password Memorability and Security Empirical Results

  • A. Blackwell, R. Anderson,

and A.Grant Sept.-Oct. 2004

  • Vol. 2 ,

Issue 5 , 25 - 31 IEEE Security and Privacy 2 2020/06/01 NIST Fingerprint Evaluations and Developments M.D. Garris, E.Tabassi, and C.L. Wilson Nov. 2006

  • Vol. 94, No.

11 , 1915- 1926 Proceedings of the IEEE 3 2020/06/01 Probing the Uniqueness and Randomness

  • f IrisCodes: Results From 200 Billion

Iris Pair Comparisons

  • J. Daugman

Nov. 2006

  • Vol. 94, No.

11 , 1927- 1935 Proceedings of the IEEE 4 2020/06/01 Dissecting Android Malware: Characterization and Evolution

  • Y. Zhou and X. Jiang

May 2012 95-109 Proceedings of IEEE Symposium

  • n Security and Privacy

5 2020/06/01 Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection J.F. Levine, J.B.Grizzard, and H.L. Owen Jan.-Feb. 2006

  • Vol. 4,
  • Issue. 1 , 24-

32 IEEE Security and Privacy 6 2020/06/01 SMM Rootkit: A New Breed of OS Independent Malware

  • S. Embleton, S. Sparks, and

C.C. Zou 2010 DOI: 10.1002/sec. 166 Security and Communication Networks 7 2020/06/08 Defending against flooding-based distributed denial-of-service attacks: a tutorial Chang, R.K.C.

  • Oct. 2002
  • Vol. 40,
  • Issue. 10,

42-51 Communications Magazine, IEEE 8 2020/06/08 Denial-of-Service Attack-Detection Techniques

  • G. Carl, G. Kesidis, R.R.

Brooks, and S. Rai Jan.-Feb. 2006

  • Vol. 10,
  • Issue. 1, 82-

89 IEEE Internet Computing 9 2020/06/08 Amplification and DRDoS Attack Defense – A Survey and New Perspectives F.J. Ryba, M. Orlinski, M. Wahlisch, C. Rossowy, and T.C. Schmidt June 2015 Technical Report (http://arxiv.org/abs/1505.07892) 10 2020/06/08 The Future of the Firewall

  • J. Wilson

2005 Business Communications Review 11 2020/06/08 Efficient Multimatch Packet Classification and Lookup with TCAM

  • F. Yu, R.H. Katz, T.V.

Lakshman Jan.-Feb. 2005

  • Vol. 25, No.

1, 50-59 IEEE Micro Journal/Conference Name Vol., No., Pages 學號/姓名 預計報告日期 序號 Article Title Authors Date

slide-2
SLIDE 2

12 2020/06/08 Scalable Packet Classification by TCAM Entry Encryption Algorithm C.L. Lee and P.C. Wang 2007

  • Vol. 16, No.

3, 275-28 Journal of High Speed Networks 13 2020/06/15 Performance Improvement of Two- Dimensional Packet Classification by Filter Rephrasing P.C. Wang, C.L. Lee, C.T. Chan, and H.Y. Chang Aug. 2007

  • Vol. 15, No.

4, 906-917 IEEE/ACM Transactions on Networking 14 2020/06/15 Packet Classification Algorithms From Theory to Practice

  • Y. Qi, L. Xu, B. Yang, Y.

Xue, and J. Li 2009 648-656 Proceedings of IEEE INFOCOM 15 2020/06/15 Packet Classification with Hierarchical Cross-Producting C.L. Lee, C.T. Chan, and P.C. Wang May 2010

  • Vol. E93-D,
  • No. 5, 1117-

1126 IEICE Transactions on Information and Systems 16 2020/06/15 Fast TCAM-based Multi-match Packet Classification Using Discriminators H.T. Lin and P.C. Wang

  • Jun. 2018 Vol. 4, Issue

4, 686-697 IEEE Transactions on Multi-Scale Computing Systems 17 2020/06/15 Detecting and resolving packet filter conflicts

  • A. Hari, S. Suri, and G.

Parulkar Mar. 2010 1203-1212 Proceedings of IEEE INFOCOM 18 2020/06/15 Fast and Scalable Conflict Detection for Packet Classifier

  • F. Baboescu and G.

Varghese Aug. 2003

  • Vol. 42, No.

6, 717-735 Computer Networks 19 2020/06/22 A Topology-based Conflict Detection System for Firewall Policies Using Bit- vector-based Spatial Calculus

  • S. Thanasegaran, Y. Yin,
  • Y. Tateiwa, Y. Katayama,

and N. Takahashi Nov. 2011

  • Vol. 4, No.

11, 683-695 International Journal of Communications, Network and System Sciences 20 2020/06/22 An Efficient Conflict Detection Algorithm for Packet Filters C.L. Lee, G.Y. Lin, and Y.C. Chen

  • Feb. 2012
  • Vol. E95-D,
  • No. 2, 472-

479 IEICE Transactions on Information and Systems 21 2020/06/22 Fast and Complete Conflict Detection for Packet Classifiers C.Y. Lai and P.C. Wang

  • Jun. 2017
  • Vol. 11, No.

2, 1137- 1148 IEEE Systems Journal 22 2020/06/22 Defending Yourself: The Role of Intrusion Detection Systems

  • J. McHugh, A.Christie, and
  • J. Allen

Sep.-Oct. 2000

  • Vol. 17,
  • Issue. 5, 42-

51 IEEE Software 23 2020/06/22 Offloading IDS computation to the GPU Jacob N and Brodley C 2006 371–380 Proceedings of Computer Security Applications Conference

slide-3
SLIDE 3

24 2020/06/22 Gnort: High Performance Network Intrusion Detection Using Graphics Processors

  • G. Vasiliadis, S. Antonatos,
  • M. Polychronakis, E.P.

Markatos, and S. Iasnnidis 2008 116–134 Proceedings of International Symposium on Recent Advances in Intrusion Detection 25 2020/06/29 Hierarchical Multi-Pattern Matching Algorithm for Network Content Inspection T.F. Sheu, N.F. Huang, and H.P. Lee 2008

  • Vol. 178,

Issue 14, 2880-2898 Information Science 26 2020/06/29 An Efficient Pre-filtering Mechanism for Parallel Intrusion Detction Based on Many-core GPU

  • C. Wu, J. Yin, Z. Cai, E.

Zhu , and J. Cheng 2009 298–305 Security Technology 27 2020/06/29 MIDeA: A Multi-Parallel Intrusion Detection Architecture

  • G. Vasiliadis, M.

Polychronakis, and S. Ioannidis 2011 297–308 Proceedings of ACM Conference

  • n Computer and Communication

Security 28 2020/06/29 Robust and Scalable String Pattern Matching for Deep Packet Inspection on Multicore Processors Y.H. Yang and V.K. Prasanna 2013

  • Vol. 25,

2283-2292 IEEE Transactions on Parallel and Distributed Systems 29 2020/06/29 A Hybrid CPU/GPU Pattern-Matching Algorithm for Deep Packet Inspection C.L. Lee, Y.S. Lin, and Y.C. Chen

  • Oct. 2015

PLoS One

  • 1. 報告內容: 60% (重點為是否能清楚描述論文的內容)
  • 2. 投影片: 20% (重點在是否能有效呈現論文內容,並配合報告內容)
  • 3. 時間控制: 10% (報告時間為 20 分鐘,誤差在 +- 2 分鐘內不扣分,超過誤差範圍每分鐘扣 1 分)
  • 4. 同學互評: 10%
  • 5. 報告當日上午10點前必須將投影片檔案上傳至 E-Learning 系統

否則每遲交一天扣總分 5 分,投影片檔案請以學號做為檔名,學號英文字母請使用大寫。

  • 6. 需將投影片使用A4紙張以雙面且每面 4 張投影片的方式列印,並於報告時繳交,否則扣總分 10 分。
  • 7. 若無法於預訂時間報告,可與其他同學交換報告時間,但報告論文亦必須同時交換,

且於報告日期 3 天前與同意交換之同學親自找助教登記。未按規定者,總分扣 20 分。

  • 8. 報告當日若未準時至教室報告,但仍於當日報告者,扣總分 10 分。

評分原則: