Intelligent Mechanisms for Network Configuration and Security
暂无分享,去创建一个
Burkhard Stiller | Marinos Charalambides | Jerome Francois | Steven Latre | Corinna Schmitt | B. Stiller | J. François | M. Charalambides | S. Latré | C. Schmitt
[1] Norbert Pohlmann,et al. Secure Communication and Digital Sovereignty in Europe , 2014, ISSE.
[2] Erwin P. Rathgeb,et al. Analysis of SIP-Based Threats Using a VoIP Honeynet System , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Pavel Celeda,et al. Next Generation Application-Aware Flow Monitoring , 2014, AIMS.
[4] Angelos D. Keromytis,et al. A Comprehensive Survey of Voice over IP Security Research , 2012, IEEE Communications Surveys & Tutorials.
[5] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.
[6] Aiko Pras,et al. SSHCure: A Flow-Based SSH Intrusion Detection System , 2012, AIMS.
[7] Andy Jones,et al. Overview of SIP Attacks and Countermeasures , 2009, ISDF.
[8] Nick Feamster,et al. BISmark: A Testbed for Deploying Measurements and Applications in Broadband Access Networks , 2014, USENIX ATC.
[9] B V,et al. Nemea: Framework for stream-wise analysis of network traffic , 2014 .
[10] Aiko Pras,et al. Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX , 2014, IEEE Communications Surveys & Tutorials.