Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,054 papers from all fields of science
Search
Sign In
Create Free Account
Deep packet inspection
Known as:
Deep-packet inspection
, CPI (disambiguation)
, DPI
Expand
Deep packet inspection (DPI, also called complete packet inspection and information extraction or IX) is a form of computer network packet filtering…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acceptable use policy
Application delivery network
Application-level gateway
Buffer overflow
Expand
Broader (2)
Internet privacy
Net neutrality
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Parallelizing Deep Packet Inspection on GPU
M. Ramesh
,
Hyeran Jeon
International Conference on Big Data Computing…
2018
Corpus ID: 51601545
Network security has been very important for the software industry. Deep packet inspection (DPI) is one of the widely used…
Expand
2014
2014
Elastic deep packet inspection
B. Watson
,
Ip Blox
International Conference on Cyber Conflict
2014
Corpus ID: 20926152
Deep packet inspection (DPI) systems are required to perform at or near network line-rate speeds, matching thousands of rules…
Expand
2011
2011
IPV6 and Deep Packet Inspection
K.V.S.Mounika
,
A. R. Krishna
,
Computer Engineering
2011
Corpus ID: 212559186
– The current version of the internet, IPV4 was depleted of addresses on february3, 2011. The storage of address has led to the…
Expand
2011
2011
Space-time tradeoffs in software-based deep Packet Inspection
A. Bremler-Barr
,
Yotam Harchol
,
David Hay
IEEE 12th International Conference on High…
2011
Corpus ID: 9308822
Deep Packet Inspection (DPI) lies at the core of contemporary Network Intrusion Detection/Prevention Systems and Web Application…
Expand
2010
2010
Packet scheduling for deep packet inspection on multi-core architectures
T. Nelms
,
M. Ahamad
Symposium on Architectures for Networking and…
2010
Corpus ID: 10270158
Multi-core architectures are commonly used for network applications because the workload is highly parallelizable. Packet…
Expand
2009
2009
Efficient Regular Expression Compression Algorithm for Deep Packet Inspection: Efficient Regular Expression Compression Algorithm for Deep Packet Inspection
Qian Xu
,
E. Yue-peng
,
Jing-Guo Ge
,
Hualin Qian
2009
Corpus ID: 61894917
A memory efficient regular expression compression algorithm is devised for deep packet inspection. First, a parameter DR…
Expand
2008
2008
Analysis of Peer-to-Peer Traffic Using a Behavioural Method Based on Entropy
João V. P. Gomes
,
Pedro R. M. Inácio
,
M. Freire
,
Manuela Pereira
,
P. Monteiro
IEEE International Performance, Computing, and…
2008
Corpus ID: 10386038
The increasing number of applications offering their services over peer-to-peer (P2P) platforms is changing the properties of the…
Expand
2008
2008
Fast Dynamic Pattern Matching for Deep Packet Inspection
Xu Kefu
,
Qi Deyu
,
Qian Zhengping
,
Zheng Wei-ping
IEEE International Conference on Networking…
2008
Corpus ID: 10674796
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to…
Expand
2005
2005
A multi-gigabit rate deep packet inspection algorithm using TCAM
Jung-Sik Sung
,
Seok-Min Kang
,
Youngseok Lee
,
Taeck-Geun Kwon
,
B. Kim
GLOBECOM '05. IEEE Global Telecommunications…
2005
Corpus ID: 17625540
With the increasing importance of network protection from cyber threats, it is requested to develop a multi-gigabit rate pattern…
Expand
Highly Cited
2005
Highly Cited
2005
Fast reconfiguring deep packet filter for 1+ gigabit network
Young H. Cho
,
W. Mangione-Smith
IEEE Symposium on Field-Programmable Custom…
2005
Corpus ID: 7915650
Due to increasing number of network worms and virus, many computer network users are vulnerable to attacks. Unless network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE