2020
DOI: 10.1007/s11831-020-09419-z
|View full text |Cite
|
Sign up to set email alerts
|

A Technical Survey on Intelligent Optimization Grouping Algorithms for Finite State Automata in Deep Packet Inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…RDA balance between exploration (global search) and exploitation (local search) of the solution space. Unlike traditional optimization methods, RDA often require minimal problem-specific knowledge or parameter tuning 65 .…”
Section: Proposed Methodologymentioning
confidence: 99%
“…RDA balance between exploration (global search) and exploitation (local search) of the solution space. Unlike traditional optimization methods, RDA often require minimal problem-specific knowledge or parameter tuning 65 .…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Swarm intelligence optimization algorithms have been developed by many researchers. [ 28 ] These algorithms completely overcome the previously discussed shortcomings of the traditional algorithm because they belong to global optimization and do not rely on gradient information. Among the swarm intelligent algorithms, the PSO algorithm is easy to implement owing to its simple parameter adjustment process.…”
Section: Algorithm Implementationmentioning
confidence: 99%
“…Thus, a novel practical model for the ring-down spectral signal was established. Then, we introduced the particle swarm optimization (PSO) algorithm [28,29] into FLRDS to accomplish pulse-shape fitting of the ring-down spectral signal and extract the ring-down time. To our knowledge, the development of a model based on the amplitude modulation theory and the application of the PSO algorithm to the ring-down spectral signal have not been reported in existing literature.…”
Section: Introductionmentioning
confidence: 99%
“…In terms of network security, the undesired traffic cannot be filtered by the header information because most threats target the application layer [5,6]. Deep packet inspection and payload checking are needed to assure protection against viruses, malware, spyware, spam and deliberate incursion efforts, making this task increasingly difficult, leading to the design of security filters with lower processing time using GPUs and FPGAs [7]. Bioinformatics applications, where a considerable number of reads must be mapped (or aligned) to a longer reference or database sequence, also make use of string similarities evaluation [8].…”
Section: String Similarities In Large Datasetsmentioning
confidence: 99%