P0f ,
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009. ,
Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177123
Automated Behavioral Fingerprinting, Recent Advances in Intrusion Detection, 2009. ,
DOI : 10.1007/978-3-642-04342-0_10
Machine Learning Techniques for Passive Network Inventory, Machine Learning Techniques for Passive Network Inventory, pp.244-257 ,
DOI : 10.1109/TNSM.2010.1012.0352
PTF: Passive Temporal Fingerprinting, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011. ,
DOI : 10.1109/INM.2011.5990703
Characteristics and responsibilities involved in a phishing attack, International symposium on Information and communication technologies (WISICT). Trinity College Dublin, 2005. ,
SIP: Session Initiation Protocol RFC 3261 (Proposed Standard), Internet Engineering Task Force, pp.6026-6141, 2002. ,
KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, vol.13, issue.2, pp.415-425, 2002. ,
K-T.R.A.C.E: A kernel -means procedure for classification, Computers & Operations Research, vol.34, issue.10, pp.3154-3161, 2007. ,
DOI : 10.1016/j.cor.2005.11.023
An introduction to support Vector Machines: and other kernel-based learning methods, 2000. ,
DOI : 10.1017/CBO9780511801389
Voice over IP: Risks, threats, and vulnerabilities, International Conference on Information Systems Security (ICISS), 2009. ,
VoIP Malware: Attack Tool & Attack Scenarios, 2009 IEEE International Conference on Communications, 2009. ,
DOI : 10.1109/ICC.2009.5199570
SecSip: A stateful firewall for SIP-based networks, 2009 IFIP/IEEE International Symposium on Integrated Network Management, 2009. ,
DOI : 10.1109/INM.2009.5188807
URL : https://hal.archives-ouvertes.fr/inria-00404853
VeTo: An exploit prevention language from known vulnerabilities in SIP services, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2010. ,
DOI : 10.1109/NOMS.2010.5488464
URL : https://hal.archives-ouvertes.fr/inria-00544976
Lr parsers for natural languages, International Conference on Computational Linguistics and 22nd annual meeting on Association for Computational Linguistics, pp.354-357, 1984. ,
SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006. ,
Digital forensics in VoIP networks, 2010 IEEE International Workshop on Information Forensics and Security, 2010. ,
DOI : 10.1109/WIFS.2010.5711450
An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks, vol.51, issue.12, pp.3448-3470, 2007. ,
DOI : 10.1016/j.comnet.2007.02.001
Snort -lightweight intrusion detection for networks, USENIX conference on System administration (LISA), pp.229-238, 1999. ,
Learning rules for anomaly detection of hostile network traffic, Third IEEE International Conference on Data Mining, 2003. ,
DOI : 10.1109/ICDM.2003.1250987
Masquerade detection based on svm and sequencebased user commands profile, ACM symposium on Information, computer and communications security (ASIACCS), pp.398-400, 2007. ,
Anomaly intrusion detection for system call using the soundex algorithm and neural networks, IEEE Symposium on Computers and Communications (ISCC), 2005. ,
Specification-based anomaly detection, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.265-274, 2002. ,
DOI : 10.1145/586110.586146
NetSTAT: A network-based intrusion detection system, Journal of Computer Security, vol.7, issue.1, pp.37-71, 1999. ,
DOI : 10.3233/JCS-1999-7103
VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006. ,
DOI : 10.1109/DSN.2006.73
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.2311
Stochastic protocol modeling for anomaly based network intrusion detection, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings. ,
DOI : 10.1109/IWIAS.2003.1192454