--- a/ChengsongTanPhdThesis/example.bib Thu Sep 29 14:05:42 2022 +0100
+++ b/ChengsongTanPhdThesis/example.bib Fri Sep 30 01:47:33 2022 +0100
@@ -5,6 +5,29 @@
%% Saved with string encoding Unicode (UTF-8)
+
+@article{fowler2003,
+ title={An interpretation of the POSIX regex standard},
+ author={Fowler, Glenn},
+ journal={URL: https://web. archive. org/web/20050408073627/http://www. research. att. com/\~{} gsf/testregex/re-interpretation. html},
+ year={2003}
+}
+
+
+@inproceedings{Snort1999,
+author = {Roesch, Martin},
+title = {Snort - Lightweight Intrusion Detection for Networks},
+year = {1999},
+publisher = {USENIX Association},
+address = {USA},
+abstract = {Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Commercial NIDS have many differences, but Information Systems departments must face the commonalities that they share such as significant system footprint, complex deployment and high monetary cost. Snort was designed to address these issues.},
+booktitle = {Proceedings of the 13th USENIX Conference on System Administration},
+pages = {229–238},
+numpages = {10},
+location = {Seattle, Washington},
+series = {LISA '99}
+}
+
@inproceedings{Becchi08,
author = {Becchi, Michela and Crowley, Patrick},
year = {2008},
@@ -26,7 +49,7 @@
}
-@unpublished{CSL22
+@unpublished{CSL2022,
author = "Chengsong Tan and Christian Urban",
title = "POSIX Lexing with Bitcoded Derivatives",
note = "submitted",