-
1
-
-
38049168566
-
Random visitor: A defense against identity attacks in P2P overlay networks
-
WISA
-
J. Gu, J. Nah, C. Chae and J. Lee, Random Visitor: A Defense against Identity Attacks in P2P Overlay Networks, 9LNCS 4298, WISA 2007, pp.282-296.
-
(2007)
9LNCS 4298
, pp. 282-296
-
-
Gu, J.1
Nah, J.2
Chae, C.3
Lee, J.4
-
2
-
-
36949021289
-
An experimental study of the skype peer-to-peer VoIP system
-
February
-
S. Guha, N. Daswani and R. Jainn, An Experimental Study of the Skype Peer-to-Peer VoIP System, the 5th International Workshop on Peer-to-Peer Systems, February, 2006, pp.81-91.
-
(2006)
The 5th International Workshop on Peer-to-Peer Systems
, pp. 81-91
-
-
Guha, S.1
Daswani, N.2
Jainn, R.3
-
3
-
-
39349117411
-
Analysis and evaluation of the Skype and Google-talk VoIP systems
-
B. Sat and B. W. Wah, Analysis and Evaluation of the Skype and Google-talk VoIP Systems, IEEE ICME, 2006.
-
(2006)
IEEE ICME
-
-
Sat, B.1
Wah, B.W.2
-
4
-
-
33746875258
-
Fusion of disruptive technologies: Lessons from the Skype case
-
B. Rao, B. Angelov and O. Nov, Fusion of Disruptive Technologies: Lessons from the Skype Case, European Management Journal, Vol.24, No.2-3, 2006, pp.174-188.
-
(2006)
European Management Journal
, vol.24
, Issue.2-3
, pp. 174-188
-
-
Rao, B.1
Angelov, B.2
Nov, O.3
-
6
-
-
45849096090
-
A collaborative forensics framework for VoIP services in multi-network environments
-
H. M. Hsu, Y. S. Sun and M. C. Chen, A Collaborative Forensics Framework for VoIP Services in Multi-Network Environments, ISI 2008 Workshops, LNCS 5075, pp.260-271.
-
ISI 2008 Workshops, LNCS 5075
, pp. 260-271
-
-
Hsu, H.M.1
Sun, Y.S.2
Chen, M.C.3
-
8
-
-
77953144757
-
-
http://www.skype.com.
-
-
-
-
9
-
-
77953147318
-
-
access on 24th January, 2009
-
http://www.blackhat.com/html/bh-europe-06/bh-eu-06-speakers.html access on 24th January, 2009.
-
-
-
-
10
-
-
38949175425
-
Traffic Identification and overlay measurement of Skype
-
November
-
Y. Yu, D. Liu, J. Li and C. Shen, Traffic Identification and Overlay Measurement of Skype, ICCIS, November, 2006, pp.1043-1048.
-
(2006)
ICCIS
, pp. 1043-1048
-
-
Yu, Y.1
Liu, D.2
Li, J.3
Shen, C.4
-
13
-
-
33750323440
-
The windows registry as a forensic artifact: Illustrating evidence collection for internet usage
-
V. Mee, T. Tryfonas and I. Sutherland, The Windows Registry as a Forensic Artifact: Illustrating Evidence Collection for Internet Usage, Digital Investigation, Vol.3, Issue 3, 2006, pp.166-173.
-
(2006)
Digital Investigation
, vol.3
, Issue.3
, pp. 166-173
-
-
Mee, V.1
Tryfonas, T.2
Sutherland, I.3
-
14
-
-
33750309882
-
An analysis of the skype peer-to-peer internet telephony protocol
-
April
-
S. A. Baset and H. G. Schulzrinne, An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, IEEE INFOCOM 2006, April, 2006.
-
(2006)
IEEE INFOCOM 2006
-
-
Baset, S.A.1
Schulzrinne, H.G.2
-
15
-
-
77953151293
-
Network forensic on encrypted peer-to-peer VoIP traffics and the detection, blocking and prioritization of Skype traffics
-
C. M. Leung and Y.Y. Chan, Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking and Prioritization of Skype Traffics, the Chinese University of Hong Kong, Technical Report, 2007.
-
(2007)
The Chinese University of Hong Kong, Technical Report
-
-
Leung, C.M.1
Chan, Y.Y.2
-
17
-
-
77953162735
-
-
http://www.e-fense.com.
-
-
-
-
18
-
-
77953174376
-
-
http://www.accessdata.com.
-
-
-
-
19
-
-
77953152251
-
-
http://www.techpathways.com.
-
-
-
|