Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM
暂无分享,去创建一个
[1] Dongwook Shin,et al. Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.
[2] J. Gruber,et al. A Comparison of Measured and Calculated Speech Temporal Parameters Relevant to Speech Activity Detection , 1982, IEEE Trans. Commun..
[3] Dimitris Gritzalis,et al. A SIP-oriented SPIT Management Framework , 2008, Comput. Secur..
[4] Dimitris Gritzalis,et al. A Formally Verified Mechanism for Countering SPIT , 2010, CRITIS.
[5] Antonio Nucci,et al. You can SPIT, but you can't hide: Spammer identification in telephony networks , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Chin-Laung Lei,et al. Detecting VoIP Traffic Based on Human Conversation Patterns , 2008, IPTComm.
[7] Damien Ernst,et al. Outbound SPIT filter with optimal performance guarantees , 2012, Comput. Networks.
[8] M. Brunner,et al. ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework , 2006, IEEE Globecom 2006.
[9] Adel Bouhoula,et al. A SPIT detection algorithm based on user's call behavior , 2013, 2013 21st International Conference on Software, Telecommunications and Computer Networks - (SoftCOM 2013).
[10] Christoph Pörschmann,et al. Content-Based Detection and Prevention of Spam over IP Telephony - System Design, Prototype and First Results , 2011, 2011 IEEE International Conference on Communications (ICC).
[11] Jung-Shian Li,et al. VoIP secure session assistance and call monitoring via building security gateway , 2011, Int. J. Commun. Syst..
[12] Christian Callegari,et al. Security and delay issues in SIP systems , 2009 .
[13] Radu State,et al. Labeled VoIP Data-Set for Intrusion Detection Evaluation , 2010, EUNICE.
[14] Benxiong Huang,et al. ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks , 2010, The Journal of Supercomputing.
[15] David J. Parish,et al. Prevention of SPIT using the concept of access number (AN) , 2007 .
[16] Dimitris Gritzalis,et al. A game-theoretic analysis of preventing spam over Internet Telephony via audio CAPTCHA-based authentication , 2014, J. Comput. Secur..
[17] Dimitris Gritzalis,et al. An Adaptive Policy-Based Approach to SPIT Management , 2008, ESORICS.
[18] Muhammad Ali Akbar,et al. Securing SIP-based VoIP infrastructure against flooding attacks and Spam Over IP Telephony , 2012, Knowledge and Information Systems.
[19] A. Belghith,et al. A distributed cooperative detection scheme for SPIT attacks in SIP based systems , 2012, 2012 Third International Conference on The Network of the Future (NOF).
[20] Dimitris Gritzalis,et al. Audio CAPTCHA: Existing solutions assessment and a new implementation for VoIP telephony , 2010, Comput. Secur..
[21] Haining Wang,et al. A Voice Spam Filter to Clean Subscribers' Mailbox , 2012, SecureComm.
[22] Jürgen Quittek,et al. Detecting SPIT Calls by Checking Human Communication Patterns , 2007, 2007 IEEE International Conference on Communications.
[23] Haesun Park,et al. CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation , 2007, CEAS.
[24] Adel Bouhoula,et al. Behavior-based approach to detect spam over IP telephony attacks , 2015, International Journal of Information Security.
[25] Hyung-Jong Kim,et al. DEVS-Based modeling of VoIP spam callers' behavior for SPIT level calculation , 2009, Simul. Model. Pract. Theory.
[26] Giannis F. Marias,et al. SPIDER: A platform for managing SIP-based Spam over Internet Telephony (SPIT) , 2011, J. Comput. Secur..
[27] Antonio Ruiz-Martínez,et al. A lightweight payment scheme for real-time services based on SIP , 2012, EURASIP Journal on Wireless Communications and Networking.
[28] Dimitris Gritzalis,et al. Formal analysis for robust anti-SPIT protection using model checking , 2012, International Journal of Information Security.
[29] Fei Wang,et al. A Speaker Recognition Based Approach for Identifying Voice Spammer , 2012, WISM.
[30] Ming-Yang Su,et al. Using data mining approaches to identify voice over IP spam , 2015, Int. J. Commun. Syst..
[31] Dorgham Sisalem,et al. SDRS: A Voice-over-IP Spam Detection and Reaction System , 2008, IEEE Security & Privacy.
[32] Iwao Sasase,et al. Unsupervised Clustering-based SPITters Detection Scheme , 2015, J. Inf. Process..
[33] Giannis F. Marias,et al. SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.
[34] Muhammad Ajmal Azad,et al. Caller-REP: Detecting unwanted calls with caller social strength , 2013, Comput. Secur..
[35] Jinyoung Ahn,et al. Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm , 2008, Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
[36] Bettina Schnor,et al. A SPIT Avoidance Workflow for SIP-Provider , 2012, ICON 2012.