-
3
-
-
38349178234
-
Analysis and signature of Skype VoIP session traffic
-
S. Ehlert, S. Petgang, T. Magedanz, and D. Sisalem, "Analysis and signature of Skype VoIP session traffic," in International Conference on Communications, Internet, and Information Technology, St. Thomas, USVI, USA 2006, pp. 83-89.
-
International Conference on Communications, Internet, and Information Technology, St. Thomas, USVI, USA 2006
, pp. 83-89
-
-
Ehlert, S.1
Petgang, S.2
Magedanz, T.3
Sisalem, D.4
-
4
-
-
84877311956
-
-
(19 July). Available
-
P. Parkes. (19 July). Skype downtime today. Available: http://blogs.skype.com/en/2010/12/skype-downtime-today.html
-
Skype Downtime Today
-
-
Parkes, P.1
-
5
-
-
84877287313
-
-
Available
-
Skype. Skype Encryption. Available: https://support.Skype.com/en/faq/ FA31/Does-Skype-use-encryption
-
Skype Encryption
-
-
-
6
-
-
84877286049
-
-
Available
-
Skype. Skype Codec. Available: http://developer.Skype.com/silk
-
Skype Codec
-
-
-
8
-
-
84879202939
-
Detailed analysis of Skype traffic
-
D. Bonfiglio, M. Mellia, M. Meo, and D. Rossi, "Detailed analysis of Skype traffic," Trans. Multi., vol. 11, pp. 117-127, 2009.
-
(2009)
Trans. Multi.
, vol.11
, pp. 117-127
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
-
9
-
-
51349155248
-
Tracking down Skype traffic
-
D. Bonfiglio, M. Mellia, M. Meo, N. Ritacca, and D. Rossi, "Tracking down Skype traffic," in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, Phoenix, AZ, 2008, pp. 261-265.
-
INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, Phoenix, AZ, 2008
, pp. 261-265
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Ritacca, N.4
Rossi, D.5
-
11
-
-
33750309882
-
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
-
S. A. Baset and H. G. Schulzrinne, "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol," in INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, Barcelona, Spain, 2006, pp. 1-11.
-
INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, Barcelona, Spain, 2006
, pp. 1-11
-
-
Baset, S.A.1
Schulzrinne, H.G.2
-
12
-
-
70350455046
-
A real-time algorithm for Skype traffic detection and classification
-
D. Adami, C. Callegari, S. Giordano, M. Pagano, and T. Pepe, "A real-time algorithm for Skype traffic detection and classification," Smart Spaces and Next Generation Wired/Wireless Networking, pp. 168-179, 2009.
-
(2009)
Smart Spaces and Next Generation Wired/Wireless Networking
, pp. 168-179
-
-
Adami, D.1
Callegari, C.2
Giordano, S.3
Pagano, M.4
Pepe, T.5
-
13
-
-
84877292438
-
-
(19 July). Available
-
D. Bewsher. (19 July). Advertising in Skype. Available: http://blogs.skype.com/en/2011/03/advertising.html
-
Advertising in Skype
-
-
Bewsher, D.1
-
15
-
-
0347259893
-
Evaluating internet information services in the Asia-Pacific region
-
Watters, P.A., Watters, M.F., & Carr, S.C. (1998). Evaluating internet information services in the Asia-Pacific region. Internet Research, 9(3), 266-271.
-
(1998)
Internet Research
, vol.9
, Issue.3
, pp. 266-271
-
-
Watters, P.A.1
Watters, M.F.2
Carr, S.C.3
-
16
-
-
78649832038
-
Authorship Attribution for Twitter in 140 characters or less
-
R. Layton, P. Watters, and R. Dazeley, "Authorship Attribution for Twitter in 140 characters or less," in The Second Cybercrime and Trustworthy Computing Workshop Ballarat, Ballarat, VIC, 2010, pp. 1-8.
-
The Second Cybercrime and Trustworthy Computing Workshop Ballarat, Ballarat, VIC, 2010
, pp. 1-8
-
-
Layton, R.1
Watters, P.2
Dazeley, R.3
-
17
-
-
78649888272
-
Towards Understanding Malware Behaviour by the Extraction of API Calls
-
M. Alazab, S. Venkataraman, and P. Watters, "Towards Understanding Malware Behaviour by the Extraction of API Calls " in The Second Cybercrime and Trustworthy Computing Workshop Ballarat, VIC, 2010, pp. 52-59
-
The Second Cybercrime and Trustworthy Computing Workshop Ballarat, VIC, 2010
, pp. 52-59
-
-
Alazab, M.1
Venkataraman, S.2
Watters, P.3
-
18
-
-
84870509534
-
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures
-
Procoessdng Australasian Data Mining Conference (AusDM 11) Ballarat, Australia Vamplew, P., Stranieri, A., Ong, K.-L., Christen, P. and Kennedy, P. J. Eds., ACS.
-
M. Alazab, S. Venkatraman, P. Watters, and M. Alazab, "Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures" In Procoessdng Australasian Data Mining Conference (AusDM 11) Ballarat, Australia. CRPIT, 121. Vamplew, P., Stranieri, A., Ong, K.-L., Christen, P. and Kennedy, P. J. Eds., ACS. 2011, pp.171-182
-
(2011)
CRPIT
, vol.121
, pp. 171-182
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
Alazab, M.4
|