메뉴 건너뛰기




Volumn , Issue , 2009, Pages

An innovative way to analyze large ISP data for IMS security and monitoring

Author keywords

Anomaly detection; IMS; NGN; Security; VoIP

Indexed keywords

ANOMALY DETECTION; FUNCTIONAL REQUIREMENT; IP MULTIMEDIA SUBSYSTEMS; MONITORING TOOLS; NGN (NEXT GENERATION NETWORK); NGN ARCHITECTURE; SECURITY ATTACKS; SECURITY FEATURES; SERVICE PROVIDER; SESSION-BASED SERVICES; TELECOM ITALIA; VOICE OVER IP;

EID: 76249118183     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIN.2009.5357065     Document Type: Conference Paper
Times cited : (6)

References (5)
  • 1
    • 47849119609 scopus 로고    scopus 로고
    • VoIP security and privacy threat taxonomy
    • Jonathan Zar, "VoIP Security and Privacy Threat Taxonomy," VoIP Security Alliance, 2005
    • (2005) VoIP Security Alliance
    • Zar, J.1
  • 3
    • 76249121239 scopus 로고    scopus 로고
    • RFC5039 the Session Initiation Protocol (SIP) and Spam
    • IETF
    • J. Rosenberg C. Jennings "RFC5039 The Session Initiation Protocol (SIP) and Spam," IETF, 2008.
    • (2008) J. Rosenberg C. Jennings
  • 5
    • 76249122979 scopus 로고    scopus 로고
    • Moving dispersion method for statistical anomaly detection in intrusion detection systems
    • July
    • J. Dj. Golić, "Moving dispersion method for statistical anomaly detection in intrusion detection systems," ISC International Journal of Information Security, vol.1., No.2, pp. 3-22, July 2009.
    • (2009) ISC International Journal of Information Security , vol.1 , Issue.2 , pp. 3-22
    • Dj. Golić, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.