-
4
-
-
56949086676
-
An efficient end-to-end security mechanism for IP multimedia subsystem
-
Dec.
-
C. Y. Chen, T. Y. Wu, Y. M. Huang, and H. H. Chao, "An efficient end-to-end security mechanism for IP multimedia subsystem," Comput. Commun., vol. 31, no. 18, pp. 4259-4268, Dec. 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.18
, pp. 4259-4268
-
-
Chen, C.Y.1
Wu, T.Y.2
Huang, Y.M.3
Chao, H.H.4
-
5
-
-
79951837206
-
Challenges to next generation services in IP multimedia subsystem
-
Jun. 2010
-
K. D. Chang, C. Y. Chen, J. L. Chen, and H. H. Chao, "Challenges to next generation services in IP multimedia subsystem," J. Inf. Process. Syst., vol. 6, no. 2, pp. 129-146, Jun. 2010.
-
J. Inf. Process. Syst.
, vol.6
, Issue.2
, pp. 129-146
-
-
Chang, K.D.1
Chen, C.Y.2
Chen, J.L.3
Chao, H.H.4
-
6
-
-
77955711784
-
Security threats and solutions for application server of IP multimedia subsystem (IMS-AS)
-
Sep. 28-29
-
M. Sher, S. Wu, and T. Magedanz, "Security threats and solutions for application server of IP multimedia subsystem (IMS-AS)," in Proc. IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (Mon AM2006), Tuebingen, Germany, Sep. 28-29, 2006.
-
(2006)
Proc. IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (Mon AM2006), Tuebingen, Germany
-
-
Sher, M.1
Wu, S.2
Magedanz, T.3
-
8
-
-
50049119444
-
Detecting flooding attacks against IP multimedia subsystem (IMS) networks
-
Doha, Qatar, Mar. 31-Apr.
-
Y. Rebahi, M. Sher, and T. Magedanz, "Detecting flooding attacks against IP multimedia subsystem (IMS) networks," in Proc. 7th ACS/IEEE Int. Conf. Computer Systems and Applications (AICCSA 2008), Doha, Qatar, Mar. 31-Apr. 4, 2008, pp. 848-851.
-
(2008)
Proc. 7th ACS/IEEE Int. Conf. Computer Systems and Applications (AICCSA 2008)
, vol.4
, pp. 848-851
-
-
Rebahi, Y.1
Sher, M.2
Magedanz, T.3
-
10
-
-
57349133188
-
Security issues with the IP multimedia subsystem (IMS)
-
M. T. Hunter, R. J. Clark, and F. S. Park, "Security issues with the IP multimedia subsystem (IMS)," in Proc. 2007 Workshop on Middleware forNext-Generation Converged Networks and Applications, Port Beach, CA, 2007.
-
(2007)
Proc. 2007 Workshop on Middleware ForNext-Generation Converged Networks and Applications, Port Beach, CA
-
-
Hunter, M.T.1
Clark, R.J.2
Park, F.S.3
-
11
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and overview," Computer, vol. 35, pp. 27-30, 2002.
-
(2002)
Computer
, vol.35
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
12
-
-
0034226287
-
A revised taxonomy for intrusiondetection systems
-
H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusiondetection systems," Ann. Telecommun., vol. 55, pp. 361-378, 2000.
-
(2000)
Ann. Telecommun.
, vol.55
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
13
-
-
67649635433
-
Intrusion detection system for IP multimedia subsystem using K-nearest neighbor classifier
-
A. H. Farooqi and A. Munir, "Intrusion detection system for IP multimedia subsystem using K-nearest neighbor classifier," in Proc. IEEE Int. Multitopic Conf. (INMIC 2008), 2008, pp. 423-428.
-
(2008)
Proc. IEEE Int. Multitopic Conf. (INMIC 2008)
, pp. 423-428
-
-
Farooqi, A.H.1
Munir, A.2
-
14
-
-
44049088453
-
Detecting voIP floods using the hellinger distance
-
DOI 10.1109/TPDS.2007.70786
-
H. Sengar, W. Haining, D. Wijesekera, and S. Jajodia, "Detecting Vo IP floods using the Hellinger distance," IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 794-805, Jun. 2008. (Pubitemid 351712185)
-
(2008)
IEEE Transactions on Parallel and Distributed Systems
, vol.19
, Issue.6
, pp. 794-805
-
-
Sengar, H.1
Wang, H.2
Wijesekera, D.3
Jajodia, S.4
-
15
-
-
71249115571
-
Intrusion detection in IMS: Experiences with a Hellinger distance-based flooding detector
-
C. Hecht, P. Reichl, A. Berger, O. Jung, and I. Gojmerac, "Intrusion detection in IMS: Experiences with a Hellinger distance-based flooding detector," in Proc. First Int. Conf. Evolving Internet (INTERNET'09), 2009, pp. 65-70.
-
(2009)
Proc. First Int. Conf. Evolving Internet (INTERNET'09)
, pp. 65-70
-
-
Hecht, C.1
Reichl, P.2
Berger, A.3
Jung, O.4
Gojmerac, I.5
-
16
-
-
34250634870
-
-
[Online].Available to be published
-
D. Pollard, Asymptopia First ed., 2000 [Online].Available: http://www. stat.yale.edu pollard/, to be published
-
(2000)
Asymptopia First Ed.
-
-
Pollard, D.1
-
17
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery, vol. 2, pp. 121-167, Jun. 1, 1998. (Pubitemid 128695475)
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.J.C.1
-
18
-
-
56549097799
-
High-order Markov kernels for intrusion detection
-
C. Yin, S. Tian, and S. Mu, "High-order Markov kernels for intrusion detection," Neurocomputers, vol. 71, pp. 3247-3252, 2008.
-
(2008)
Neurocomputers
, vol.71
, pp. 3247-3252
-
-
Yin, C.1
Tian, S.2
Mu, S.3
-
19
-
-
0041419360
-
The mixture transition distribution model for high-order Markov chains and non-Gaussian time series
-
Aug.
-
A. Berchtold and A. E. Raftery, "The mixture transition distribution model for high-order Markov chains and non-Gaussian time series," Statist. Sci., vol. 17, pp. 328-356, Aug. 2002.
-
(2002)
Statist. Sci.
, vol.17
, pp. 328-356
-
-
Berchtold, A.1
Raftery, A.E.2
-
20
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
DOI 10.1109/3468.935043, PII S1083442701052882, Information Assurance
-
Y. Nong, L. Xiangyang, C. Qiang, S. M. Emran, and X. Mingming, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274, Jul. 2001. (Pubitemid 33142052)
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
22
-
-
79951829862
-
-
Open IMS Core Jul. 30, 2009 [Online]. Available
-
Open IMS Core Jul. 30, 2009 [Online]. Available: http://www.openimscore. org/
-
-
-
-
23
-
-
79951830952
-
-
UCT IMS Client Jul. 30, 2009 [Online]. Available
-
UCT IMS Client Jul. 30, 2009 [Online]. Available: http://uctimsclient. berlios.de/
-
-
-
-
24
-
-
79951836590
-
-
IMS/NGN Performance Benchmark Jul. 30, 2009 [Online]. Available
-
IMS/NGN Performance Benchmark Jul. 30, 2009 [Online]. Available: http://sipp.sourceforge.net/ims-bench/
-
-
-
-
25
-
-
79951845360
-
-
Wire Shark Jul. 30, 2009 [Online]. Available
-
Wire Shark Jul. 30, 2009 [Online]. Available: http://www.wireshark. org/
-
-
-
-
26
-
-
79951821066
-
-
TCPDump/Lib PCAP Jul. 30, 2009 [Online]. Available
-
TCPDump/Lib PCAP Jul. 30, 2009 [Online]. Available: http://www. tcpdump.org/
-
-
-
-
27
-
-
79951829232
-
-
LIBSVM\A Library for Support Vector Machines Jul. 30, 2009 [Online]. Available
-
LIBSVM\A Library for Support Vector Machines Jul. 30, 2009 [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
-
-
-
-
28
-
-
2942737360
-
IPv6 enabling IMS-based peer-to-peer services in 3GPP and 3GPP2 cellular networks
-
Apr.
-
J. Wiljakka, J. Soininen, J. Sundquist, and T. Sipilä, "IPv6 enabling IMS-based peer-to-peer services in 3GPP and 3GPP2 cellular networks," J. Internet Technol., vol. 5, no. 2, pp. 67-73, Apr. 2004.
-
(2004)
J. Internet Technol.
, vol.5
, Issue.2
, pp. 67-73
-
-
Wiljakka, J.1
Soininen, J.2
Sundquist, J.3
Sipilä, T.4
-
29
-
-
68249154935
-
Architectural aspects of automated network selection in heterogeneous wireless systems
-
F. Bari and V. C. M. Leung, "Architectural aspects of automated network selection in heterogeneous wireless systems," Int. J. Ad Hoc Ubiquitous Comput., vol. 4, no. 5, pp. 282-291, 2009.
-
(2009)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.4
, Issue.5
, pp. 282-291
-
-
Bari, F.1
Leung, V.C.M.2
-
30
-
-
42149117774
-
Optimal routing for SIP-based session set up over IMS in mobile environment
-
DOI 10.1504/IJIPT.2007.016226
-
M. T. Alam and Z. D. Wu, "Optimal routing for SIP-based session set up over IMS in mobile environment," Int. J. Internet Protocol Technol., vol. 2, no. 3, pp. 264-276, 2007. (Pubitemid 351522893)
-
(2007)
International Journal of Internet Protocol Technology
, vol.2
, Issue.3-4
, pp. 264-276
-
-
Alam, M.T.1
Wu, Z.D.2
|