Zobrazeno 1 - 10
of 110
pro vyhledávání: '"string matching algorithm"'
Publikováno v:
BIOS, Vol 4, Iss 1, Pp 34-41 (2023)
The Kamus Besar Bahasa Indonesia (KBBI) application is a software or application that allows users to access and search for the meaning of a single word in Indonesian along with its spelling. Indonesian has a complex morphological structure, where wo
Externí odkaz:
https://doaj.org/article/ec52bf132a394dd29c34bcad1dbe3be8
Autor:
Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande, Aderonke Anthonia Kayode
Publikováno v:
EURASIP Journal on Information Security, Vol 2020, Iss 1, Pp 1-14 (2020)
Abstract Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and d
Externí odkaz:
https://doaj.org/article/27372f01abe34aea9ad7f516f9739556
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Indonesian Journal of Electrical Engineering and Computer Science. 30:1624
The development in the field of computer technology, and the increase in the growth rate of database, alongside the extraction of certain data from a huge pool of database involve intricate and complex processes. The processes comprise text mining, p
Publikováno v:
IEEE Access, Vol 9, Pp 62857-62866 (2021)
YARA is a tool for pattern matching used by malware analysts all over the world. YARA can scan files, as well as process memory. It allows us to define sequences of symbols as text strings, hexadecimal strings and regular expressions. However, the us
Autor:
Abdullahi Abubakar, Oluwatobi Noah Akande, Oluwakemi Christiana Abikoye, Aderonke Anthonia Kayode, Ahmed Haruna Dokoro
Publikováno v:
EURASIP Journal on Information Security, Vol 2020, Iss 1, Pp 1-14 (2020)
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy co
Autor:
Nicholas Chandra
Publikováno v:
International Journal of Emerging Trends in Engineering Research. 8:623-629
Autor:
Djamel Bellala, Lazhar Ourlis
Publikováno v:
Scalable Computing: Practice and Experience. 20:563-576
The Aho-Corasick (AC) algorithm is a multiple pattern exact string-matching algorithm proposed by Alfred V. Aho and Margaret J. Corasick. It is used to locate all occurrences of a finite set of patterns within an input text simultaneously. The AC alg
Given a text $T$ of length $n$ and a pattern $P$ of length $m$, the string matching problem is a task to find all occurrences of $P$ in $T$. In this study, we propose an algorithm that solves this problem in $O((n + m)q)$ time considering the distanc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::42ab3013972ebd73d10cd4236b6da5c5
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 26:143-154
The Aho–Corasick (AC) string matching algorithm is commonly used in signature-based intrusion detection and antivirus systems. In this paper, we present a hardware implementation of the AC algorithm that can process multiple characters per cycle. S