Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
Assessing the security of VoIP Services, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007. ,
DOI : 10.1109/INM.2007.374802
URL : https://hal.archives-ouvertes.fr/inria-00148363
State, and O. Festor. a method for fingerprinting : cas 193, 2007. ,
KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
Advanced Network Fingerprinting, RAID '08 : Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.372-389, 2008. ,
DOI : 10.1007/978-3-540-87403-4_20
URL : https://hal.archives-ouvertes.fr/inria-00326054
Failles et VoIP, MISC Magazine -Edition française : Multi-System & Internet Security Cookbook. Misc #39, 2008. ,
Fuzzing for vulnerabilities in the VoIP space, EICAR '08 : 17th Annual Conference of the European Institute for Computer Anti-Virus Research, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00326086
Management of mobile ad-hoc networks: evaluating the network behavior, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.17-30 ,
DOI : 10.1109/INM.2005.1440766
URL : https://hal.archives-ouvertes.fr/inria-00000227
Management of mobile ad hoc networks: information model and probe-based architecture, International Journal of Network Management, vol.1, issue.5, pp.335-347, 2005. ,
DOI : 10.1002/nem.577
URL : https://hal.archives-ouvertes.fr/inria-00000257
Fault Monitoring in Ad-Hoc Networks Based on Information Theory, Lecture Notes in Computer Science, vol.29, issue.4, pp.427-438, 2006. ,
DOI : 10.1109/18.761251
URL : https://hal.archives-ouvertes.fr/inria-00090211
Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006. ,
DOI : 10.1109/NOMS.2006.1687564
URL : https://hal.archives-ouvertes.fr/inria-00090206
Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, pp.339-350 ,
DOI : 10.1109/NOMS.2006.1687564
URL : https://hal.archives-ouvertes.fr/inria-00090206
A probabilistic approach for managing mobile ad-hoc networks, IEEE Transactions on Network and Service Management, vol.4, issue.1, 2007. ,
DOI : 10.1109/TNSM.2007.030104
URL : https://hal.archives-ouvertes.fr/inria-00153555
Self-configurable fault monitoring in ad-hoc networks, Ad Hoc Networks, vol.6, issue.3, pp.458-473, 2008. ,
DOI : 10.1016/j.adhoc.2007.04.001
URL : https://hal.archives-ouvertes.fr/inria-00153604
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks, Journal of Network and Systems Management, vol.26, issue.12, pp.479-497, 2005. ,
DOI : 10.1007/s10922-005-9008-3
URL : https://hal.archives-ouvertes.fr/inria-00000235
Support vector clustering, Scholarpedia, vol.3, issue.6, pp.125-137, 2001. ,
DOI : 10.4249/scholarpedia.5187
A Short Survey of Document Structure Similarity Algorithms, The 5th International Conference on Internet Computing, 2005. ,
ANMP: ad hoc network management protocol, IEEE Journal on Selected Areas in Communications, vol.17, issue.8, pp.1506-1531, 1999. ,
DOI : 10.1109/49.780355
Optimized Link State Routing (OLSR) Protocol, 2003. ,
DOI : 10.17487/rfc3626
URL : https://hal.archives-ouvertes.fr/inria-00471712
Support-vector networks, Machine Learning, pp.273-297, 1995. ,
DOI : 10.1007/BF00994018
A voip security management architecture, Hellerstein and Stiller ,
XBGP-MAN: an XML management architecture for BGP, International Journal of Network Management, vol.42, issue.4, pp.295-309, 2006. ,
DOI : 10.1002/nem.600
Role-Based Access Control for XML Enabled Management Gateways, Lecture Notes in Computer Science, vol.13, pp.183-195, 2004. ,
DOI : 10.1145/775412.775421
URL : https://hal.archives-ouvertes.fr/inria-00100139
An integrated security framework for XML based management, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.587-600 ,
DOI : 10.1109/INM.2005.1440831
URL : https://hal.archives-ouvertes.fr/inria-00000213
Role-Based Access Control for XML enabled multi-protocol management gateways, IEEE Transactions on Network and Service Management, vol.3, issue.1, 2006. ,
DOI : 10.1109/TNSM.2006.4798304
URL : https://hal.archives-ouvertes.fr/inria-00001222
A model for checking consistency in access control policies for network management, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.11-19, 2007. ,
DOI : 10.1109/INM.2007.374765
URL : https://hal.archives-ouvertes.fr/inria-00172054
Internet Message Access Protocol -Version 4rev1, Mar. 2003. Updated by RFCs 4466, pp.4551-5032 ,
Efficient algorithms for agglomerative hierarchical clustering methods, Journal of Classification, vol.25, issue.1, pp.7-24, 1984. ,
DOI : 10.1007/BF01890115
Probing TCP implementations, USENIX Summer, pp.245-255, 1994. ,
Hacking Exposed VoIP : Voice Over IP Security Secrets and Solutions, 2007. ,
Behavioral Fingerprinting, RAID '09 : Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00406482
Advanced Wireless Networks: 4G Technologies, 2006 IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications, 2006. ,
DOI : 10.1109/ISSSTA.2006.311811
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.6326
An Architecture for Describing Simple Network Management Protocol (SNMP) Management FrameWorks, 2002. ,
DOI : 10.17487/rfc3411
Simple Mail Transfer Protocol, 2001. ,
Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002. ,
DOI : 10.1145/508791.508835
A formal approach for passive testing of protocol data portions, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.122-131, 2002. ,
DOI : 10.1109/ICNP.2002.1181393
Holistic VoIP intrusion detection and prevention system, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.1-9, 2007. ,
DOI : 10.1145/1326304.1326306
URL : https://hal.archives-ouvertes.fr/inria-00169036
Intrusion detections mechanisms for VoIP applications, Third annual security workshop (VSW'06, 2006. ,
VoIP Honeypot Architecture, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007. ,
DOI : 10.1109/INM.2007.374775
URL : https://hal.archives-ouvertes.fr/inria-00149554
Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008. ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
Self-organization in communication networks: principles and design paradigms, IEEE Communications Magazine, vol.43, issue.7, pp.78-85, 2005. ,
DOI : 10.1109/MCOM.2005.1470824
Network Protocol System Fingerprinting - A Formal Approach, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006. ,
DOI : 10.1109/INFOCOM.2006.157
Self Adaptive High Interaction Honeypots Driven by Game Theory, Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009. ,
DOI : 10.1007/978-3-642-05118-0_51
Insight into MPACK Hacker kit ,
Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
Assessing the security of VoIP Services, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.373-382, 2007. ,
DOI : 10.1109/INM.2007.374802
URL : https://hal.archives-ouvertes.fr/inria-00148363
Security Advisory: SIP Digest Access Authentication RELAY-ATTACK for Toll-Fraud, 2007. ,
Security Advisory: SQL injection in asteriskaddons and XSS injection in WWW application in Areski, FreePBX and Trixbox, 2007. ,
Fuzzing for vulnerabilities in the VoIP space, 17th EICAR Annual Conference 17th EICAR Annual Conference European Institute for Computer Antivirus Research, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00326086
Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, 2009. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
Advanced Network Fingerprinting, RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pp.372-389, 2008. ,
DOI : 10.1007/978-3-540-87403-4_20
URL : https://hal.archives-ouvertes.fr/inria-00326054
Failles et VoIP, MISC Magazine -Edition française: Multi-System & Internet Security Cookbook. Misc #39, 2008. ,
Fuzzing for vulnerabilities in the VoIP space, EICAR '08: 17th Annual Conference of the European Institute for Computer Anti-Virus Research, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00326086
Fuzzing for vulnerabilities in the VoIP space, ACM International Journal of Computer Virology, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00326086
Learning regular sets from queries and counterexamples, Information and Computation, vol.75, issue.2, pp.87-106, 1987. ,
DOI : 10.1016/0890-5401(87)90052-6
Management of mobile ad-hoc networks: evaluating the network behavior, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.17-30 ,
DOI : 10.1109/INM.2005.1440766
URL : https://hal.archives-ouvertes.fr/inria-00000227
Management of mobile ad hoc networks: information model and probe-based architecture, International Journal of Network Management, vol.1, issue.5, pp.335-347, 2005. ,
DOI : 10.1002/nem.577
URL : https://hal.archives-ouvertes.fr/inria-00000257
Fault Monitoring in Ad-Hoc Networks Based on Information Theory, Lecture Notes in Computer Science, vol.29, issue.4, pp.427-438 ,
DOI : 10.1109/18.761251
URL : https://hal.archives-ouvertes.fr/inria-00090211
Probabilistic Management of Ad-Hoc Networks, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, pp.339-350 ,
DOI : 10.1109/NOMS.2006.1687564
URL : https://hal.archives-ouvertes.fr/inria-00090206
A probabilistic approach for managing mobile ad-hoc networks, 2007. [33] R. Badonnel, R. State, and O. Festor. Self-configurable fault monitoring in ad-hoc networks ,
DOI : 10.1109/TNSM.2007.030104
URL : https://hal.archives-ouvertes.fr/inria-00153555
A Framework for Optimizing End-to-End Connectivity Degree in Mobile Ad-Hoc Networks, Journal of Network and Systems Management, vol.26, issue.12, pp.479-497, 2005. ,
DOI : 10.1007/s10922-005-9008-3
URL : https://hal.archives-ouvertes.fr/inria-00000235
CallRank: Combating SPIT using call duration, social networks and global reputation, Fourth Conference on Email and Anti-Spam (CEAS2007), 2007. ,
Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr, In of Lecture Notes in Computer Science, pp.343-358, 2006. ,
DOI : 10.1007/11836810_25
Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, 2009. ,
DOI : 10.1145/1595637.1595645
Protocol informatics ,
Support vector clustering, Scholarpedia, vol.3, issue.6, pp.125-137, 2001. ,
DOI : 10.4249/scholarpedia.5187
A Survey of Clustering Data Mining Techniques, Grouping Multidimensional Data, pp.25-71, 2006. ,
DOI : 10.1007/3-540-28349-8_2
Revealing skype traffic, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.37-48, 2007. ,
DOI : 10.1145/1282427.1282386
On the resemblance and containment of documents, Proceedings. Compression and Complexity of SEQUENCES 1997 (Cat. No.97TB100171), 1997. ,
DOI : 10.1109/SEQUEN.1997.666900
Recognizing self-mutating malware by code normalization and control-flow graph analysis, IEEE Security & Privacy, 2007. ,
DOI : 10.1007/11790754_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758
Discovering and exploiting 802.11 wireless driver vulnerabilities, Journal in Computer Virology, vol.4, issue.1, pp.25-37, 2008. ,
DOI : 10.1007/s11416-007-0065-x
A Short Survey of Document Structure Similarity Algorithms, The 5th International Conference on Internet Computing, 2005. ,
FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007. ,
Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007. ,
DOI : 10.1145/1315245.1315286
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001. ,
DOI : 10.1145/1961189.1961199
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001. ,
DOI : 10.1145/1961189.1961199
Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.53-58, 2006. ,
DOI : 10.1109/VOIPMS.2006.1638123
Mining specifications of malicious behavior, ESEC-FSE '07: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp.5-14, 2007. ,
New ranking algorithms for parsing and tagging, Proceedings of the 40th Annual Meeting on Association for Computational Linguistics , ACL '02, 2002. ,
DOI : 10.3115/1073083.1073128
Support-vector networks, Machine Learning, pp.273-297, 1995. ,
DOI : 10.1007/BF00994018
A voip security management architecture, Hellerstein and Stiller ,
XBGP-MAN: an XML management architecture for BGP, International Journal of Network Management, vol.42, issue.4, pp.295-309, 2006. ,
DOI : 10.1002/nem.600
Role-Based Access Control for XML Enabled Management Gateways, Lecture Notes in Computer Science, vol.13, pp.183-195, 2004. ,
DOI : 10.1145/775412.775421
URL : https://hal.archives-ouvertes.fr/inria-00100139
An integrated security framework for XML based management, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005., pp.587-600 ,
DOI : 10.1109/INM.2005.1440831
URL : https://hal.archives-ouvertes.fr/inria-00000213
Role-based access control for xml enabled multiprotocol management gateways, IEEE Transactions on Network and Service Management, vol.2, issue.1, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00001222
A model for checking consistency in access control policies for network management, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.11-19, 2007. ,
DOI : 10.1109/INM.2007.374765
URL : https://hal.archives-ouvertes.fr/inria-00172054
Internet Message Access Protocol -Version 4rev1, Mar. 2003. Updated by RFCs 4466, pp.4551-5032 ,
DOI : 10.17487/rfc2060
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.179.184
An introduction to support Vector Machines: and other kernel-based learning methods, 2000. ,
DOI : 10.1017/CBO9780511801389
Augmented BNF for Syntax Specifications: ABNF, 1997. ,
Protocol-Independent Adaptive Replay of Application Dialog, NDSS, 2006. ,
Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-4027, 1984. ,
DOI : 10.1145/1455770.1455820
A decision based one-against-one method for multi-class support vector machine, Pattern Analysis and Applications, vol.7, issue.2, pp.164-175, 2004. ,
DOI : 10.1007/s10044-004-0213-6
An intrusion-detection model, IEEE Symposium on Security and Privacy, pp.118-133, 1986. ,
Probing TCP implementations, USENIX Summer, pp.245-255, 1994. ,
QROCK: A quick version of the ROCK algorithm for clustering of categorical data, Pattern Recognition Letters, vol.26, issue.15, pp.2364-2373, 2005. ,
DOI : 10.1016/j.patrec.2005.04.008
Sidewinder: An Evolutionary Guidance System for Malicious Input Crafting, 2006. ,
Hacking Exposed VoIP: Voice Over IP Security Secrets and Solutions, 2007. ,
VoIP Security and Privacy Threat Taxonomy. VOIPSA, 2005. ,
VoIP defender, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007. ,
DOI : 10.1145/1326304.1326307
Behavioral Fingerprinting, RAID '09: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00406482
Automatically Extracting Fields from Unknown Network Protocols, Systems and Machine Learning Workshop, 2006. ,
Automatically extracting fields from unknown network protocols, 2006. ,
ACAS, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.197-202, 2005. ,
DOI : 10.1145/1080173.1080183
A comparison of methods for multiclass support vector machines, Neural Networks IEEE Transactions on, vol.13, issue.2, pp.415-425, 2002. ,
Understanding Voice over Ip Security, Artech, 2006. ,
A Functional Method for Assessing Protocol Implementation Security, 2001. ,
SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007. ,
DOI : 10.1145/1269880.1269891
Simple Mail Transfer Protocol, 2001. ,
DOI : 10.17487/rfc5321
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.8066
Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007. ,
DOI : 10.1145/1216895.1216897
Automating mimicry attacks using static binary analysis, SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, pp.11-11, 2005. ,
Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002. ,
DOI : 10.1145/508791.508835
SecSip: A Stateful Firewall for SIP-based Networks Long Island États-Unis d'Amérique, 11th IFIP/IEEE International Symposium on Integrated Network Management -IM 2009, 2009. ,
A formal approach for passive testing of protocol data portions, 10th IEEE International Conference on Network Protocols, 2002. Proceedings., pp.122-131, 2002. ,
DOI : 10.1109/ICNP.2002.1181393
ScriptGen: an automated script generation tool for honeyd, 21st Annual Computer Security Applications Conference (ACSAC'05), pp.203-214, 2005. ,
DOI : 10.1109/CSAC.2005.49
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.3033
Automatic protocol format reverse engineering through conectect-aware monitored execution, 15th Symposium on Network and Distributed System Security (NDSS), 2008. ,
The Database Hacker's Handbook: Defending Database Servers, 2005. ,
Dynamic detection and classification of computer viruses using general behavior patterns, Proceedings of the 5th International Virus Bulletin Conference, pp.75-88, 1995. ,
Unexpected means of protocol inference Transport and application protocol scrubbing, INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, pp.1381-1390, 2000. ,
Machine Learning and Data Mining for Computer Security: Methods and Applications, 2005. ,
DOI : 10.1007/1-84628-253-5
Generating test data with enhanced context-free grammars, IEEE Software, vol.7, issue.4, pp.50-55, 1990. ,
DOI : 10.1109/52.56422
Efficient Convolution Kernels for Dependency and Constituent Syntactic Trees, ECML: Proceedings of the 17th European Conference on Machine Learning, 2006. ,
DOI : 10.1007/11871842_32
Making tree kernels practical for natural language learning, Proceedings of the Eleventh International Conference on European Association for Computational Linguistics, 2006. ,
Tree kernel engineering for proposition re-ranking, Proceedings of Mining and Learning with Graphs, 2006. ,
Intrusion detection: Support vector machines and neural networks. The IEEE Computer Society Student Magazine, 2002. ,
Non-Cooperative Games, The Annals of Mathematics, vol.54, issue.2, pp.286-295, 1951. ,
DOI : 10.2307/1969529
Holistic VoIP intrusion detection and prevention system, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.1-9, 2007. ,
DOI : 10.1145/1326304.1326306
URL : https://hal.archives-ouvertes.fr/inria-00169036
Intrusion detections mechanisms for VoIP applications, Third annual security workshop (VSW'06, 2006. ,
VoIP Honeypot Architecture, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, pp.109-118, 2007. ,
DOI : 10.1109/INM.2007.374775
URL : https://hal.archives-ouvertes.fr/inria-00149554
Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008. ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
Replayer, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.311-321, 2006. ,
DOI : 10.1145/1180405.1180444
SIP intrusion detection and prevention: recommendations and prototype implementation, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.47-52, 2006. ,
DOI : 10.1109/VOIPMS.2006.1638122
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach, 2003. ,
DOI : 10.1007/978-1-4615-0467-2
Practical VoIP Security, 2006. ,
Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007. ,
DOI : 10.1109/ICC.2007.329
Secure IP Telephony using Multi-layered Protection, Proceedings of The 10th Annual Network and Distributed System Security Symposium, 2003. ,
Inference of finite automata using homing sequences, STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing, pp.411-420, 1989. ,
Evaluating and improving firewalls for iptelephony environments, 1st IP telephony workshop, 2000. ,
Diversity-based inference of finite automata, 1988. ,
SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006. ,
Securing VoIP and PSTN from integrated signaling network vulnerabilities, 1st IEEE Workshop on VoIP Management and Security, 2006., 2006. ,
DOI : 10.1109/VOIPMS.2006.1638116
Detecting VoIP Floods using the Hellinger Distance. Transactions on Parallel and Distributed Systems : Accepted for future publication, 2007. ,
Progressive multi gray-leveling: a voice spam protection algorithm, IEEE Network, vol.20, issue.5, pp.18-24, 2006. ,
DOI : 10.1109/MNET.2006.1705879
Network Protocol System Fingerprinting - A Formal Approach, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-12, 2006. ,
DOI : 10.1109/INFOCOM.2006.157
Fuzzing: Brute Force Vulnerability Discovery, 2007. ,
Probabilistic trees and automata for application behavior modeling, Proceedings of the 43rd ACM Southeast Conference, 2003. ,
Behavioral classification, Proceedings Eicar'06, 2006. ,
PROTOS Test-Suite: c07-sip Adaptive, model-based monitoring for cyber attack detection, RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp.80-92, 2000. ,
Fast kernels on strings and trees, Proceedings of Neural Information Processing Systems, 2002. ,
Malware behaviour analysis, Journal in Computer Virology, vol.5, issue.2, pp.279-287, 2008. ,
DOI : 10.1007/s11416-007-0074-9
Self Adaptive High Interaction Honeypots Driven by Game Theory, Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, 2009. ,
DOI : 10.1007/978-3-642-05118-0_51
Automatic protocol reverse engineering from network traces, pp.199-212 ,
SIP Robustness Testing for Large-Scale Use, SOQUA/TECOS, pp.165-178, 2004. ,
Automatic network protocol analysis, Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSSâ08), 2008. ,
SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004. ,
Incorporating active fingerprinting into SPIT prevention systems, Third annual security workshop ,
Incorporating Active Fingerprinting into SPIT Prevention Systems, Third Annual VoIP Security Workshop, 2006. ,
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007. ,
DOI : 10.1145/1326304.1326314
Learning from labeled and unlabeled data with label propagation, 2002. ,