-
1
-
-
22344449516
-
An analysis of the skype peer-to-peer internet telephony protocol
-
CUCS-039-04, Sept
-
S. A. Baset and H. Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol. In Columbia University Technical Report CUCS-039-04, Sept. 2004.
-
(2004)
Columbia University Technical Report
-
-
Baset, S.A.1
Schulzrinne, H.2
-
2
-
-
33750309882
-
An analysis of the skype peer-to-peer internet telephony protocol
-
Apr
-
S. A. Baset and H. Schulzrinne. An analysis of the skype peer-to-peer internet telephony protocol. In IEEE INFOCOM' 06, Apr. 2006.
-
(2006)
IEEE INFOCOM' 06
-
-
Baset, S.A.1
Schulzrinne, H.2
-
4
-
-
70449577353
-
Open source voip traffic monitoring
-
May
-
L. Deri. Open source voip traffic monitoring. In SANE 2006, May 2006.
-
(2006)
SANE 2006
-
-
Deri, L.1
-
5
-
-
85019224720
-
-
B. F. et. al. Peer-to-peer communication across network address translators. In USENIX, pages 179-192, 2005.
-
B. F. et. al. Peer-to-peer communication across network address translators. In USENIX, pages 179-192, 2005.
-
-
-
-
7
-
-
14944345677
-
Transport layer identification of p2p traffic
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. C. Claffy. Transport layer identification of p2p traffic. In Internet Measurement Conference, pages 121-134, 2004.
-
(2004)
Internet Measurement Conference
, pp. 121-134
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.C.4
-
8
-
-
33745615461
-
Principles-driven forensic analysis
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Principles-driven forensic analysis. In NSPW, pages 85-93, 2005.
-
(2005)
NSPW
, pp. 85-93
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
9
-
-
34548135293
-
Toward models for forensic analysis
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Toward models for forensic analysis. In SADFE, pages 3-15, 2007.
-
(2007)
SADFE
, pp. 3-15
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
10
-
-
39349117411
-
Analysis and evaluation of the skype and google-talk voip systems
-
B. Sat and B. W. Wah. Analysis and evaluation of the skype and google-talk voip systems. In IEEE ICME., 2006.
-
(2006)
IEEE ICME
-
-
Sat, B.1
Wah, B.W.2
-
12
-
-
34547335916
-
Characterizing and detecting relayed traffic: A case study using skype
-
Apr
-
K. Suh, D. R. Figueiredo, J. Kurose, and D. Towsley. Characterizing and detecting relayed traffic: A case study using skype. In IEEE INFOCOM'06, Apr. 2006.
-
(2006)
IEEE INFOCOM'06
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
13
-
-
0034593179
-
A requires/provides model for computer attacks
-
S. Templeton and K. Levitt. A requires/provides model for computer attacks. In NSPW, 2000.
-
(2000)
NSPW
-
-
Templeton, S.1
Levitt, K.2
-
14
-
-
0037244227
-
-
C. I. et. al. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment. Journal of Computer Security, 11(1):1-33, 2003.
-
C. I. et. al. A comparative experimental evaluation study of intrusion detection system performance in a gigabit environment. Journal of Computer Security, 11(1):1-33, 2003.
-
-
-
-
15
-
-
33745773302
-
Tracking anonymous peer-to-peer voip calls on the internet
-
X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer voip calls on the internet. In ACM CCS, pages 81-91, 2005.
-
(2005)
ACM CCS
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
16
-
-
38949175425
-
Traffic identification and overlay measurement of skype
-
Nov
-
Y. Yu, D. Liu, J. Li, and C. Shen. Traffic identification and overlay measurement of skype. In ICCIS, pages 1043-1048, Nov. 2006.
-
(2006)
ICCIS
, pp. 1043-1048
-
-
Yu, Y.1
Liu, D.2
Li, J.3
Shen, C.4
|