-
1
-
-
44049090814
-
CISCO SIP Proxy Server
-
"CISCO SIP Proxy Server," SIP High Availability Overview, www.cisco.com/univercd/cc/td/doc/product/ software/ios123/123cgcr/vvfax_c/callc_c/sip_c/sipha_c/hachap1.htm, 2005.
-
(2005)
SIP High Availability Overview
-
-
-
2
-
-
44049097138
-
iSoftTech SIP Proxy Server
-
"iSoftTech SIP Proxy Server," Software Design Overview Template, www.isofttech.com/downloads/SIP_3261Ρoxy_Stack.pdf, 2005.
-
(2005)
Software Design Overview Template
-
-
-
3
-
-
44049091093
-
-
AltiGen Communications, AltiGen Alti-IP 600H IP Telephone, Product Overview - VoIP Phones, http://www.altigen.com/ analog-IP-telephone-sets.html, 2005.
-
AltiGen Communications, AltiGen Alti-IP 600H IP Telephone, Product Overview - VoIP Phones, http://www.altigen.com/ analog-IP-telephone-sets.html, 2005.
-
-
-
-
4
-
-
44049086319
-
-
Arbor Networks, Arbor Peakflow and Netflow, Product Overview, http://www.arbornetworks.com/downloads/, 2006.
-
Arbor Networks, Arbor Peakflow and Netflow, Product Overview, http://www.arbornetworks.com/downloads/, 2006.
-
-
-
-
7
-
-
44049087978
-
-
T. Darmohray and R. Oliver, Hot Spares for DoS Attacks, ;login: The Magazine of Usenix and SAGE, 25, no. 7, July 2000.
-
T. Darmohray and R. Oliver, "Hot Spares for DoS Attacks," ;login: The Magazine of Usenix and SAGE, vol. 25, no. 7, July 2000.
-
-
-
-
8
-
-
44049097403
-
Digital Equipment Corporation Traces
-
DEC
-
DEC, "Digital Equipment Corporation Traces," Hourly Traffic Traces 2005.
-
(2005)
Hourly Traffic Traces
-
-
-
9
-
-
34250683541
-
-
technical report, GERAD and DIRO, Univ. of Montreal
-
A. Deslauriers, J. Pichitlamken, P. L'Ecuyer, and A.N. Avramidis, "Markov Chain Models of a Telephone Call Center with Call Blending," technical report, GERAD and DIRO, Univ. of Montreal, 2003.
-
(2003)
Markov Chain Models of a Telephone Call Center with Call Blending
-
-
Deslauriers, A.1
Pichitlamken, J.2
L'Ecuyer, P.3
Avramidis, A.N.4
-
12
-
-
0003415244
-
-
IETF RFC 2616
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, Hypertext Transfer Protocol - HTTP1.1, IETF RFC 2616, 1999.
-
(1999)
Hypertext Transfer Protocol - HTTP1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
13
-
-
44049103531
-
Data Swapping: A Risk-Utility Framework and Web Service Implementation
-
S. Gomatam, A.F. Karr, C. Liu, and A.P. Sanil, "Data Swapping: A Risk-Utility Framework and Web Service Implementation," Proc. Nat'l Conf. Digital Government Research (DG.O), 2003.
-
(2003)
Proc. Nat'l Conf. Digital Government Research (DG.O)
-
-
Gomatam, S.1
Karr, A.F.2
Liu, C.3
Sanil, A.P.4
-
16
-
-
85013623251
-
Congestion Avoidance and Control
-
88, pp, Aug
-
V. Jacobson and M.J. Karels, "Congestion Avoidance and Control," Proc. ACM SIGCOMM '88, pp. 314-329, Aug. 1988.
-
(1988)
Proc. ACM SIGCOMM
, pp. 314-329
-
-
Jacobson, V.1
Karels, M.J.2
-
20
-
-
44049105437
-
-
Mazu Networks, Mazu Profiler, Product Overview, http://www.mazunetworks.com/resources/product-sheets/, 2006.
-
Mazu Networks, "Mazu Profiler," Product Overview, http://www.mazunetworks.com/resources/product-sheets/, 2006.
-
-
-
-
21
-
-
44049087582
-
-
Front Range GigaPOP, Daily traffic traces
-
NLANR, NLANR Network Traffic Traces, Front Range GigaPOP, Daily traffic traces, http://pma.nlanr.net/Traces/, 2005.
-
(2005)
NLANR Network Traffic Traces
-
-
-
23
-
-
34250634870
-
-
first ed, book in progress
-
D. Pollard, Asymptopia, first ed., book in progress, http:// www.stat.yale.edu/pollard/, 2000.
-
(2000)
Asymptopia
-
-
Pollard, D.1
-
24
-
-
44049109042
-
Network Intrusion and QoS Impact in VoIP
-
Qovia Inc, white paper, Aug
-
Qovia Inc., "Network Intrusion and QoS Impact in VoIP," white paper, http://www.qovia.com/, Aug. 2004.
-
(2004)
-
-
-
26
-
-
0037984544
-
-
IETF RFC 3261
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, SIP: Session Initiation Protocol IETF RFC 3261, 2002.
-
(2002)
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
28
-
-
0003709134
-
-
IETF RFC 1889
-
H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, IETF RFC 1889, 1996.
-
(1996)
RTP: A Transport Protocol for Real-Time Applications
-
-
Schulzrinne, H.1
Casner, S.2
Frederick, R.3
Jacobson, V.4
-
29
-
-
34250615390
-
Fast Detection of Denial of Service Attacks on IP Telephony
-
June
-
H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, "Fast Detection of Denial of Service Attacks on IP Telephony," Proc. 14th Int'l Workshop Quality of Service (IWQoS '06), June 2006.
-
(2006)
Proc. 14th Int'l Workshop Quality of Service (IWQoS '06)
-
-
Sengar, H.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
30
-
-
33845562254
-
VoIP Intrusion Detection through Interacting Protocol State Machines
-
June
-
H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, "VoIP Intrusion Detection through Interacting Protocol State Machines," Proc. Int'l Conf. Dependable Systems and Networks (DSN '06), June 2006.
-
(2006)
Proc. Int'l Conf. Dependable Systems and Networks (DSN '06)
-
-
Sengar, H.1
Wijesekera, D.2
Wang, H.3
Jajodia, S.4
-
31
-
-
44049106948
-
-
first ed. Addison-Wesley
-
W. Stevens, TCP/IP Illustrated Volume-1, first ed. Addison-Wesley, 1994.
-
(1994)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.1
-
32
-
-
20444503956
-
Detecting Viral Propagations Using Email Behavior Profiles
-
May
-
S.J. Stolfo, W.-J. Li, S. Hershkop, K. Wang, C.-W. Hu, and O. Nimeskern, "Detecting Viral Propagations Using Email Behavior Profiles," ACM Trans. Internet Technology, May 2004.
-
(2004)
ACM Trans. Internet Technology
-
-
Stolfo, S.J.1
Li, W.-J.2
Hershkop, S.3
Wang, K.4
Hu, C.-W.5
Nimeskern, O.6
-
33
-
-
44049085524
-
-
Product Overview
-
Telecost, Telecost: On Call Durations, Product Overview, http:// www.telecost.co.uk/Products/OnCallDurations.htm, 2005.
-
(2005)
Telecost: On Call Durations
-
-
-
34
-
-
0031274649
-
Wide-Area Internet Traffic Patterns and Characteristics
-
Nov./Dec
-
K. Thompson, G.J. Miller, and R. Wilder, "Wide-Area Internet Traffic Patterns and Characteristics," IEEE Network, vol. 11, Nov./Dec. 1997.
-
(1997)
IEEE Network
, vol.11
-
-
Thompson, K.1
Miller, G.J.2
Wilder, R.3
-
37
-
-
34250676979
-
-
World Agroforestry Center, Tutorial
-
"World Agroforestry Center," Regression and Analysis of Variance Tutorial, http://www.worldagroforestry.org/, 2005.
-
(2005)
Regression and Analysis of Variance
-
-
-
38
-
-
4544342880
-
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
-
June
-
Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. Tsai, "SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments," Proc. Int'l Dependable Systems and Networks Conf. (DSN '04), June 2004.
-
(2004)
Proc. Int'l Dependable Systems and Networks Conf. (DSN '04)
-
-
Wu, Y.1
Bagchi, S.2
Garg, S.3
Singh, N.4
Tsai, T.5
-
39
-
-
44049096149
-
Datasheet-ZIP 4X4
-
Zultys Technologies
-
Zultys Technologies, "Datasheet-ZIP 4X4," Product Overview - VoIP Phones, http://www.zultystechnologies.com, 2005.
-
(2005)
Product Overview - VoIP Phones
-
-
|