-
3
-
-
80052786866
-
-
USENIX Association Berkeley, CA Proceedings of the Steps To Reducing Unwanted Traffic on the internet Workshop (Cambridge, MA)
-
R. Dantu, and P. Kolan Detecting spam in VoIP networks 2005 USENIX Association Berkeley, CA Proceedings of the Steps To Reducing Unwanted Traffic on the internet Workshop (Cambridge, MA)
-
(2005)
Detecting Spam in VoIP Networks
-
-
Dantu, R.1
Kolan, P.2
-
4
-
-
76249118183
-
An innovative way to analyze large ISP data for IMS security and monitoring
-
Intelligence in Next Generation Networks, ICIN. 26-29 October 2009 10.1109/ICIN.2009.5357065
-
P. De Lutiis, and D. Lombardo An innovative way to analyze large ISP data for IMS security and monitoring Intelligence in Next Generation Networks, ICIN 2009. 13th International Conference on 26-29 October 2009 10.1109/ICIN.2009. 5357065 pp. 1-6
-
(2009)
13th International Conference
, pp. 1-6
-
-
De Lutiis, P.1
Lombardo, D.2
-
5
-
-
64849083317
-
Benchmarking graph-based clustering algorithms
-
7th IAPR- TC15 Workshop on Graph-based Representations (GbR 2007) ISSN 0262-8856
-
P. Foggia, G. Percannella, C. Sansone, and M. Vento Benchmarking graph-based clustering algorithms 7th IAPR- TC15 Workshop on Graph-based Representations (GbR 2007) Image and Vision Computing 27 Issue 7 4 June 2009 979 988 ISSN 0262-8856
-
(2009)
Image and Vision Computing
, vol.27
, Issue.7
, pp. 979-988
-
-
Foggia, P.1
Percannella, G.2
Sansone, C.3
Vento, M.4
-
6
-
-
76249122979
-
Moving dispersion method for statistical anomaly detection in intrusion detection systems
-
J.Dj. Golic Moving dispersion method for statistical anomaly detection in intrusion detection systems ISC International Journal of Information Security 1 no. 2 July 2009 3 22
-
(2009)
ISC International Journal of Information Security
, vol.1
, Issue.2
, pp. 3-22
-
-
Golic, J.Dj.1
-
7
-
-
34547297263
-
Host-based network monitoring tools for MANETs
-
A. Karygiannis, E. Antonakakis, and A. Apostolopoulos Host-based network monitoring tools for MANETs October 2006 Proceedings of the 3rd ACM international Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor and Ubiquitous Networks, Terromolinos, Spain
-
(2006)
Proceedings of the 3rd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor and Ubiquitous Networks, Terromolinos, Spain
-
-
Karygiannis, A.1
Antonakakis, E.2
Apostolopoulos, A.3
-
10
-
-
77950660500
-
Voice-over-IP security: Research and practice
-
March/April
-
A.D. Keromytis Voice-over-IP security: research and practice IEEE Security and Privacy March/April, 2010 76 78
-
(2010)
IEEE Security and Privacy
, pp. 76-78
-
-
Keromytis, A.D.1
-
11
-
-
0025489075
-
The self-organizing map
-
T. Kohonen The self-organizing map Proceedings of the IEEE 78 no. 9 September 1990 1464 1480
-
(1990)
Proceedings of the IEEE
, vol.78
, Issue.9
, pp. 1464-1480
-
-
Kohonen, T.1
-
13
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information Systems Security 3 4 2000 227 261
-
(2000)
ACM Transactions on Information Systems Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
14
-
-
0035101723
-
Impact of network convergence on telecommunications software
-
DOI 10.1109/35.894380
-
S. Moyer, and A. Umar The impact of network convergence on telecommunications software Communications Magazine IEEE 39 no. 1 Jan 2001 78 84 10.1109/35.894380 (Pubitemid 32169379)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.1
, pp. 78-84
-
-
Moyer, S.1
Umar, A.2
-
18
-
-
50249102911
-
On Spam over Internet Telephony (SPIT) prevention
-
J. Quittek, S. Niccolini, S. Tartarelli, and R. Schlegel On Spam Over Internet Telephony (SPIT) prevention Communications Magazine IEEE 46 no. 8 August 2008 80 86
-
(2008)
Communications Magazine IEEE
, vol.46
, Issue.8
, pp. 80-86
-
-
Quittek, J.1
Niccolini, S.2
Tartarelli, S.3
Schlegel, R.4
-
19
-
-
0442296744
-
A Bayesian paradigm for designing intrusion detection systems
-
DOI 10.1016/S0167-9473(03)00177-4
-
S.L. Scott A Bayesian paradigm for designing intrusion detection systems Computational Statistics and Data Analysis Journal 45 1 2004 69 83 (Pubitemid 38188003)
-
(2004)
Computational Statistics and Data Analysis
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, S.L.1
-
21
-
-
0000963889
-
Nearest neighbor clustering
-
U. von Luxburg, S. Bubeck, S. Jegelka, and M. Kaufmann Nearest neighbor clustering Annals of Statistics 9 no. 1 1981 135 140
-
(1981)
Annals of Statistics
, vol.9
, Issue.1
, pp. 135-140
-
-
Von Luxburg, U.1
Bubeck, S.2
Jegelka, S.3
Kaufmann, M.4
-
23
-
-
70450078363
-
Spam detection in voice-over-IP calls through semi-supervised clustering
-
DSN '09. IEEE/IFIP International Conference on
-
Yu-Sung Wu, S. Bagchi, N. Singh, and R. Wita Spam detection in voice-over-IP calls through semi-supervised clustering Dependable Systems & Networks 2009 307 316 DSN '09. IEEE/IFIP International Conference on
-
(2009)
Dependable Systems & Networks
, pp. 307-316
-
-
Wu, Y.-S.1
Bagchi, S.2
Singh, N.3
Wita, R.4
-
24
-
-
47849119609
-
VoIP security and privacy threat taxonomy
-
Jonathan Zar VoIP security and privacy threat taxonomy VoIP Security Alliance 2005
-
(2005)
VoIP Security Alliance
-
-
Zar, J.1
|