-
1
-
-
33646677487
-
Presence and availability with ims: Applications architecture, traffic analysis, and capacity impacts
-
Mar
-
C. Urrutia-Valds, A. Mukhopadhyay, and M. El-Sayed, "Presence and availability with ims: Applications architecture, traffic analysis, and capacity impacts," Bell Labs Technical Journal, vol. 10(4), pp. 101-107, Mar 2006.
-
(2006)
Bell Labs Technical Journal
, vol.10
, Issue.4
, pp. 101-107
-
-
Urrutia-Valds, C.1
Mukhopadhyay, A.2
El-Sayed, M.3
-
2
-
-
38049035715
-
-
Wiley, March
-
M. Poikselka, A. Niemi, H. Khartabil, and G. Mayer, The IMS IP Multimedia Concepts and Services. Wiley, March 2006.
-
(2006)
The IMS IP Multimedia Concepts and Services
-
-
Poikselka, M.1
Niemi, A.2
Khartabil, H.3
Mayer, G.4
-
3
-
-
0003240332
-
SIP: Session initiation protocol
-
June
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, "SIP: Session initiation protocol. rfc 3261," IETF, June 2002.
-
(2002)
IETF
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
4
-
-
85084163281
-
-
R. Zhang and X. Wang, Billing attacks on SIP-based VoIP systems, In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007), 2007.
-
R. Zhang and X. Wang, "Billing attacks on SIP-based VoIP systems," In Proceedings of the 1st USENIX Workshop on Offensive Technologies (WOOT 2007), 2007.
-
-
-
-
5
-
-
0001736564
-
A bayes approach to a quality control model
-
M.A. Girshick and H. Rubin, "A bayes approach to a quality control model," Ann. Math. Statist, vol. 23 1, pp. 114-125, 1952.
-
(1952)
Ann. Math. Statist
, vol.23
, Issue.1
, pp. 114-125
-
-
Girshick, M.A.1
Rubin, H.2
-
8
-
-
70349717154
-
The open sip express router (OpenSER)
-
OPENSER
-
OPENSER, "The open sip express router (OpenSER)."
-
-
-
-
10
-
-
70349692713
-
Session initiation protocol (SIP) server overload control: Design and evaluation
-
Heidelberg, Germany
-
C. Shen, H. Schulzrinne, and E. Nahum, "Session initiation protocol (SIP) server overload control: Design and evaluation," in IPTComm'08: Proceedings of Principles, Systems and Applications of IP Telecommunications 2008, Heidelberg, Germany, 2008.
-
(2008)
IPTComm'08: Proceedings of Principles, Systems and Applications of IP Telecommunications 2008
-
-
Shen, C.1
Schulzrinne, H.2
Nahum, E.3
-
12
-
-
33751040642
-
Mitigating attacks on open functionality in SMS-capable cellular networks
-
New York, NY, USA: ACM
-
P. Traynor, W. Enck, P. McDaniel, and T. L. Porta, "Mitigating attacks on open functionality in SMS-capable cellular networks," in MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2006, pp. 182-193.
-
(2006)
MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking
, pp. 182-193
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
13
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Rio de Janeiro, Brazil, April
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy, "A social network based patching scheme for worm containment in cellular networks," in Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, April 2009.
-
(2009)
Proceedings of IEEE INFOCOM
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjany, S.4
Nucciy, A.5
-
14
-
-
84869622463
-
-
3GPP2, IMS security framework
-
3GPP2, "IMS security framework," www.3gpp2.org/Public-html/ specs/S.R0086-A-v1.0-040614.pdf 2004.
-
-
-
-
15
-
-
70349712621
-
-
3GPP, Feasibility study on IMS security extensions 3GPP TR 33.802, 3GPP, V0.1.0, 2005
-
3GPP, "Feasibility study on IMS security extensions 3GPP TR 33.802," 3GPP, vol. V0.1.0, 2005.
-
-
-
-
16
-
-
33744815196
-
-
E. E. Anderlind, D. W. Faucher, E. H. Grosse, D. N. Heer, A. R. McGee, D.P. Strand, and R.J.T. Jr., IMS security, Bell Labs Technical Journal, 11(1), pp. 37-58, 2006.
-
E. E. Anderlind, D. W. Faucher, E. H. Grosse, D. N. Heer, A. R. McGee, D.P. Strand, and R.J.T. Jr., "IMS security," Bell Labs Technical Journal, vol. 11(1), pp. 37-58, 2006.
-
-
-
-
19
-
-
0038056517
-
Session initiation protocol (SIP)-specific event notification
-
June
-
A. B. Roach, "Session initiation protocol (SIP)-specific event notification. rfc 3265," IETF, June 2002.
-
(2002)
IETF
-
-
Roach, A.B.1
-
20
-
-
22244475877
-
A presence event package for the session initiation protocol (SIP)
-
August
-
J. Rosenberg, "A presence event package for the session initiation protocol (SIP). rfc 3856," IETF, August 2004.
-
(2004)
IETF
-
-
Rosenberg, J.1
-
21
-
-
33750948175
-
A session initiation protocol (SIP) event notification extension for resource lists
-
August
-
A. B. Roach, B. Campbell, and J. Rosenberg, "A session initiation protocol (SIP) event notification extension for resource lists. rfc 4662," IETF, August 2006.
-
(2006)
IETF
-
-
Roach, A.B.1
Campbell, B.2
Rosenberg, J.3
-
22
-
-
33744524845
-
Low-rate TCP-targeted denial of service attacks and counter strategies
-
August
-
A. Kuzmanovic and E. W. Knightly, "Low-rate TCP-targeted denial of service attacks and counter strategies," in IEEE/ACM Transactions on Networking (TON), vol. 14, August 2006.
-
(2006)
IEEE/ACM Transactions on Networking (TON)
, vol.14
-
-
Kuzmanovic, A.1
Knightly, E.W.2
-
23
-
-
34548310426
-
On the detection of signaling DoS attacks on 3G wireless networks
-
Anchorage, Alaska, May
-
P. P. Lee, T. Bu, and T. Woo, "On the detection of signaling DoS attacks on 3G wireless networks," in Proceedings of IEEE INFOCOM, Anchorage, Alaska, May 2007.
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Lee, P.P.1
Bu, T.2
Woo, T.3
-
24
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
25
-
-
14644397228
-
-
Change-point monitoring for the detection of DoS attacks, IEEE Trans. Dependable Secur. Comput., 1, no. 4, pp. 193-208, 2004, member-Haining Wang and Member-Danlu Zhang and Fellow-Kang G. Shin.
-
"Change-point monitoring for the detection of DoS attacks," IEEE Trans. Dependable Secur. Comput., vol. 1, no. 4, pp. 193-208, 2004, member-Haining Wang and Member-Danlu Zhang and Fellow-Kang G. Shin.
-
-
-
-
26
-
-
37849015209
-
Mining call and mobility data to improve paging efficiency in cellular networks
-
New York, NY, USA: ACM
-
H. Zang and J. C. Bolot, "Mining call and mobility data to improve paging efficiency in cellular networks," in MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. New York, NY, USA: ACM, 2007, pp. 123-134.
-
(2007)
MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking
, pp. 123-134
-
-
Zang, H.1
Bolot, J.C.2
-
27
-
-
1242287724
-
A framework for classifying denial of service attacks
-
New York, NY, USA: ACM
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM, 2003, pp. 99-110.
-
(2003)
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
28
-
-
70349707929
-
-
JUNE
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network support for IP traceback," vol. 9, no. 3, JUNE 2001.
-
(2001)
Network support for IP traceback
, vol.9
, Issue.3
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
29
-
-
0004194675
-
ICMP traceback messages. ietf internet draft
-
Feb
-
S. Bellovin, "ICMP traceback messages. ietf internet draft," Feb 2003.
-
(2003)
-
-
Bellovin, S.1
-
30
-
-
0037810705
-
Pi: A path identification mechanism to defend against DDoS attacks
-
Washington, DC, USA: IEEE Computer Society
-
A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2003, p. 93.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 93
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
|