M. Zalewski, P0f

G. F. Lyon, Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009.

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006.
DOI : 10.1145/1177080.1177123

J. François, H. Abdelnur, R. State, and O. Festor, Automated Behavioral Fingerprinting, Recent Advances in Intrusion Detection, 2009.
DOI : 10.1007/978-3-642-04342-0_10

J. François, A. Humberto, R. State, and O. Festor, Machine Learning Techniques for Passive Network Inventory, Machine Learning Techniques for Passive Network Inventory, pp.244-257
DOI : 10.1109/TNSM.2010.1012.0352

J. François, H. Abdelnur, R. State, and O. Festor, PTF: Passive Temporal Fingerprinting, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011.
DOI : 10.1109/INM.2011.5990703

A. Van-der-merwe, M. Loock, and M. Dabrowski, Characteristics and responsibilities involved in a phishing attack, International symposium on Information and communication technologies (WISICT). Trinity College Dublin, 2005.

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., SIP: Session Initiation Protocol RFC 3261 (Proposed Standard), Internet Engineering Task Force, pp.6026-6141, 2002.

H. Abdelnur, O. Festor, and R. State, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

C. Hsu and C. Lin, A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, vol.13, issue.2, pp.415-425, 2002.

C. Cifarelli, L. Nieddu, O. Seref, and P. M. Pardalos, K-T.R.A.C.E: A kernel -means procedure for classification, Computers & Operations Research, vol.34, issue.10, pp.3154-3161, 2007.
DOI : 10.1016/j.cor.2005.11.023

N. Cristianini and J. Shawe-taylor, An introduction to support Vector Machines: and other kernel-based learning methods, 2000.
DOI : 10.1017/CBO9780511801389

A. D. Keromytis, Voice over IP: Risks, threats, and vulnerabilities, International Conference on Information Systems Security (ICISS), 2009.

M. E. Nassar, R. State, and O. Festor, VoIP Malware: Attack Tool & Attack Scenarios, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5199570

A. Lahmadi and O. Festor, SecSip: A stateful firewall for SIP-based networks, 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009.
DOI : 10.1109/INM.2009.5188807

URL : https://hal.archives-ouvertes.fr/inria-00404853

A. Lahmadi and O. Festor, VeTo: An exploit prevention language from known vulnerabilities in SIP services, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2010.
DOI : 10.1109/NOMS.2010.5488464

URL : https://hal.archives-ouvertes.fr/inria-00544976

M. Tomita, Lr parsers for natural languages, International Conference on Computational Linguistics and 22nd annual meeting on Association for Computational Linguistics, pp.354-357, 1984.

H. Scholz, SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006.

J. François, R. State, T. Engel, and O. Festor, Digital forensics in VoIP networks, 2010 IEEE International Workshop on Information Forensics and Security, 2010.
DOI : 10.1109/WIFS.2010.5711450

A. Patcha and J. Park, An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks, vol.51, issue.12, pp.3448-3470, 2007.
DOI : 10.1016/j.comnet.2007.02.001

M. Roesch, Snort -lightweight intrusion detection for networks, USENIX conference on System administration (LISA), pp.229-238, 1999.

M. V. Mahoney and P. K. Chan, Learning rules for anomaly detection of hostile network traffic, Third IEEE International Conference on Data Mining, 2003.
DOI : 10.1109/ICDM.2003.1250987

J. Seo and S. Cha, Masquerade detection based on svm and sequencebased user commands profile, ACM symposium on Information, computer and communications security (ASIACCS), pp.398-400, 2007.

B. Cha, B. Vaidya, and S. Han, Anomaly intrusion detection for system call using the soundex algorithm and neural networks, IEEE Symposium on Computers and Communications (ISCC), 2005.

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari et al., Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.265-274, 2002.
DOI : 10.1145/586110.586146

G. Vigna and R. A. Kemmerer, NetSTAT: A network-based intrusion detection system, Journal of Computer Security, vol.7, issue.1, pp.37-71, 1999.
DOI : 10.3233/JCS-1999-7103

H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.73

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.2311

J. M. Estevez-tapiador, P. Garcia-teodoro, and J. E. Diaz-verdejo, Stochastic protocol modeling for anomaly based network intrusion detection, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.
DOI : 10.1109/IWIAS.2003.1192454