In the Deep Packet Inspection (DPI), a string matching engine is necessary to detect target patterns from packet payloads. Due to the increase in the number of target patterns and wire speed, multiple hardware-based string matchers can be adopted, wherein the matches with target patterns are recognized in parallel. The ...Download Now
Recently, it is widespread for malware to collect sensitive information owned by third-party applications as well as to escalate its privilege to the system level (the highest level) on the Android platform. An attack of obtaining root-level privilege in an Android environment can form a serious threat to users from ...Download Now
Attacks with criminal motives of intentional harm to the victim system evolved from simple spoofing other's password to the complicated Web-based attacks. Because more and more systems are reliant upon the Web server to get and exchange information through the Internet, Web-based attacks have become an important subject in the ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?