메뉴 건너뛰기




Volumn 2, Issue 1, 2007, Pages

Socio-technical defense against voice spamming

Author keywords

Behavior; Reputation; SIP (Session Initiation Protocol); SPIT (Spam over IP Telephony); Tolerance; Trust

Indexed keywords

COMPUTER SIMULATION; NETWORK PROTOCOLS; PACKET NETWORKS; REAL TIME SYSTEMS; SWITCHING CIRCUITS;

EID: 33947698455     PISSN: 15564665     EISSN: 15564703     Source Type: Journal    
DOI: 10.1145/1216895.1216897     Document Type: Article
Times cited : (63)

References (47)
  • 3
    • 2442549069 scopus 로고    scopus 로고
    • CAHILL, V., SHAND, B., GRAY, E., DIMMOCK, N., TWIGG, A., BACON, J., ENGLISH, C., WAGEALLA, W., TERZIS, S., NOXON, P., BRYCE, C., SERUGENDO, G.M., SEIGNEURL, J. M., CARBONE, M., KRUKOW, K., JENSON, C., CHEN, Y., AND NIELSEN, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervas. Comput. 2, 3, 52-61.
    • CAHILL, V., SHAND, B., GRAY, E., DIMMOCK, N., TWIGG, A., BACON, J., ENGLISH, C., WAGEALLA, W., TERZIS, S., NOXON, P., BRYCE, C., SERUGENDO, G.M., SEIGNEURL, J. M., CARBONE, M., KRUKOW, K., JENSON, C., CHEN, Y., AND NIELSEN, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervas. Comput. 2, 3, 52-61.
  • 5
    • 13244267079 scopus 로고    scopus 로고
    • DAMIANI, E., VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2004. P2P-Based collaborative spam detection and filtering. In Proceedings of 4th IEEE Conference on Peer-to-Peer Computing (P2P'04) (Zurich, Switzerland). IEEE Computer Society Press, Los Alamitos, CA.
    • DAMIANI, E., VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2004. P2P-Based collaborative spam detection and filtering. In Proceedings of 4th IEEE Conference on Peer-to-Peer Computing (P2P'04) (Zurich, Switzerland). IEEE Computer Society Press, Los Alamitos, CA.
  • 9
    • 33947683962 scopus 로고    scopus 로고
    • EVETT, D. 2006. Spam Statistics 2006. http://spam-filter-review. toptenreviews.com/spam-statistics.html.
    • (2006) Spam Statistics 2006
    • EVETT, D.1
  • 11
    • 33947631504 scopus 로고    scopus 로고
    • GOECKS, J. AND MYNATT E. D. 2002. Enabling privacy management in ubiquitous computing environments through trust and reputation systems. In. Proceedings of the Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW.
    • GOECKS, J. AND MYNATT E. D. 2002. Enabling privacy management in ubiquitous computing environments through trust and reputation systems. In. Proceedings of the Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW.
  • 14
    • 33947703258 scopus 로고    scopus 로고
    • Execution contexts for determining trust in a higher-order it calculus. School of Computing
    • HEPBURN, M. AND WRIGHT, D. 2003. Execution contexts for determining trust in a higher-order it calculus. School of Computing, University of Tasmania Technical Report.
    • (2003) University of Tasmania Technical Report
    • HEPBURN, M.1    WRIGHT, D.2
  • 15
    • 33645022148 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • JØSANG, A., ISMAIL, R., AND BOYD, C. 2006. A survey of trust and reputation systems for online service provision. Decision Support Systems.
    • (2006) Decision Support Systems
    • JØSANG, A.1    ISMAIL, R.2    BOYD, C.3
  • 16
    • 33947691034 scopus 로고    scopus 로고
    • From simulations to theorems: A position paper on research in the field of computational trust
    • KRUKOW, K. AND NIELSEN, M. 2006. From simulations to theorems: A position paper on research in the field of computational trust. In Proceedings of Formal Aspects in Security and Trust.
    • (2006) Proceedings of Formal Aspects in Security and Trust
    • KRUKOW, K.1    NIELSEN, M.2
  • 17
    • 33947706887 scopus 로고    scopus 로고
    • LACY, S. 2006. Is your VoIP phone vulnerable?http://www. businessweek.com/technology/content/jun2006/tc20060613_799282.htm
    • LACY, S. 2006. Is your VoIP phone vulnerable?http://www. businessweek.com/technology/content/jun2006/tc20060613_799282.htm
  • 18
    • 33947709612 scopus 로고    scopus 로고
    • Resilient packet ring: Enabling VoIP delivery
    • LANCASTER, K. 2003. Resilient packet ring: Enabling VoIP delivery. Internet Telephony.
    • (2003) Internet Telephony
    • LANCASTER, K.1
  • 20
    • 33746649806 scopus 로고    scopus 로고
    • Detection and mitigation of spam in IP telephony networks using signaling protocol analysis
    • IEEE Computer Society Press, Los Alamitos, CA
    • MACINTOSH, R. AND VINOKUROV, D. 2005. Detection and mitigation of spam in IP telephony networks using signaling protocol analysis. In Proceedings of the IEEE Symposium on Advances in Wired and Wireless Communication. IEEE Computer Society Press, Los Alamitos, CA. 49-52.
    • (2005) Proceedings of the IEEE Symposium on Advances in Wired and Wireless Communication , pp. 49-52
    • MACINTOSH, R.1    VINOKUROV, D.2
  • 25
    • 3042874802 scopus 로고    scopus 로고
    • Trust in the λ calculus
    • ORBAEK, P. AND PALSBERG, J. 1997. Trust in the λ calculus. Funct. Prog. 7, 6, 557-591.
    • (1997) Funct. Prog , vol.7 , Issue.6 , pp. 557-591
    • ORBAEK, P.1    PALSBERG, J.2
  • 27
    • 33947696300 scopus 로고    scopus 로고
    • RAGO, S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications - Q3 Topical Report, Isuppli.
    • RAGO, S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications - Q3 Topical Report, Isuppli.
  • 31
    • 33845791268 scopus 로고    scopus 로고
    • Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages
    • RIGOUTSOS, I. AND HUYNH, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the 1st Conference on E-mail and Anti-Spam.
    • (2004) Proceedings of the 1st Conference on E-mail and Anti-Spam
    • RIGOUTSOS, I.1    HUYNH, T.2
  • 33
    • 33947689306 scopus 로고    scopus 로고
    • The session initiation protocol (SIP) and spam
    • draft-ietf-sipping-spam-02.txt
    • ROSENBERG, J., JENNINGS, C., AND PETERSON, J. 2006. The session initiation protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt
    • (2006) Spam Draft
    • ROSENBERG, J.1    JENNINGS, C.2    PETERSON, J.3
  • 34
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • SABATER, J. AND SIERRA, C. 2005. Review on computational trust and reputation models. Artifi. Intell. Rev. 24, 33-60.
    • (2005) Artifi. Intell. Rev , vol.24 , pp. 33-60
    • SABATER, J.1    SIERRA, C.2
  • 35
    • 33947691771 scopus 로고    scopus 로고
    • SAHAMI, M., DUMAIS, S., HECKERMAN, D., AND HORVITZ, E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization - Papers from the AAAI Workshop, pp. 55-62, Madison, WI. AAAI Technical Report WS-98-05.
    • SAHAMI, M., DUMAIS, S., HECKERMAN, D., AND HORVITZ, E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization - Papers from the AAAI Workshop, pp. 55-62, Madison, WI. AAAI Technical Report WS-98-05.
  • 37
    • 33947706346 scopus 로고    scopus 로고
    • SEIGNEUR, J. M., DIMMOCK, N., BRYCE, C., AND JENSEN, C. D. 2004. Combating spam with TEA (Trustworthy email addresses). In Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST'04) (Fredericton, New Brunswick, Canada). 47-58.
    • SEIGNEUR, J. M., DIMMOCK, N., BRYCE, C., AND JENSEN, C. D. 2004. Combating spam with TEA (Trustworthy email addresses). In Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST'04) (Fredericton, New Brunswick, Canada). 47-58.
  • 39
    • 68549107952 scopus 로고    scopus 로고
    • Anti-spam filtering: A centroid based classification approach
    • IEEE Computer Society Press, Los Alamitos, CA
    • SOONTHORNPHISAJ, N., CHAIKULSERIWAT, K., AND TANG-ON, P. 2002. Anti-spam filtering: A centroid based classification approach. In IEEE Proceedings ICSP. IEEE Computer Society Press, Los Alamitos, CA.
    • (2002) IEEE Proceedings ICSP
    • SOONTHORNPHISAJ, N.1    CHAIKULSERIWAT, K.2    TANG-ON, P.3
  • 42
    • 24944432504 scopus 로고    scopus 로고
    • Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification
    • WATTSON, B. 2004. Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification. In Proceedings of the 1st Conference on Email and Anti-Spam (CEAS).
    • (2004) Proceedings of the 1st Conference on Email and Anti-Spam (CEAS)
    • WATTSON, B.1
  • 45
    • 0034309383 scopus 로고    scopus 로고
    • Trust management through reputation mechanisms
    • ZACHARIA, G. AND MAES, P. 2000. Trust management through reputation mechanisms. Appl. Artifi. Intell. 14, 9, 881-908.
    • (2000) Appl. Artifi. Intell , vol.14 , Issue.9 , pp. 881-908
    • ZACHARIA, G.1    MAES, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.