A comprehensive framework for detecting and preventing VoIP fraud and misuse
暂无分享,去创建一个
Yacine Rebahi | Erwin P. Rathgeb | Dirk Hoffstadt | Tran Quang Thanh | Ralf Meister | Matthias Liebig | Y. Rebahi | E. Rathgeb | Dirk Hoffstadt | M. Liebig | Ralf Meister
[1] Karen A. Scarfone,et al. Guidelines on Firewalls and Firewall Policy , 2009 .
[2] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[3] Karen A. Scarfone,et al. Guidelines on Firewalls and Firewall Policy | NIST , 2009 .
[4] Erwin P. Rathgeb,et al. Analysis of SIP-Based Threats Using a VoIP Honeynet System , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Corinna Cortes,et al. Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.
[6] Erwin P. Rathgeb,et al. SIP Trace Recorder: Monitor and analysis tool for threats in SIP-based networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[7] Douglas Crockford,et al. The application/json Media Type for JavaScript Object Notation (JSON) , 2006, RFC.
[8] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[9] John R. Levine. DNS Blacklists and Whitelists , 2010, RFC.
[10] Roy Fielding,et al. Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .
[11] Craig Valli. An Analysis of Malfeasant Activity Directed at a VoIP Honeypot , 2010 .
[12] C. S. Hilas. User Profiling for Fraud Detection in Telecommunication Networks , 2005 .
[13] E. Jonsson,et al. Combining fraud and intrusion detection-meeting new requirements - , 2000 .