T. Abbes, A. Bouhoula, and M. Rusinowitch, Protocol analysis in intrusion detection using decision tree, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., pp.404-408, 2004.
DOI : 10.1109/ITCC.2004.1286488

URL : https://hal.archives-ouvertes.fr/inria-00100006

J. Basak, Online Adaptive Decision Trees, Neural Computation, vol.4, issue.9, pp.1959-1981, 2004.
DOI : 10.1023/A:1007413323501

L. Hall, N. Chawla, and K. W. Bowyer, Combining decision trees learned in parallel, In Working Notes of the KDD-97 Workshop on Distributed Data Mining, pp.10-15, 1998.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

M. Handley and V. Jacobson, RFC2327: SDP: Session Description Protocol, 1998.
DOI : 10.17487/rfc4566

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.180.9170

A. Hess, M. Nussbaumer, H. Hlavacs, and K. A. Hummel, Automatic Adaptation and Analysis of SIP Headers Using Decision Trees, Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, pp.69-89, 2008.
DOI : 10.1007/978-3-540-89054-6_4

S. Lo, J. C. Ou, and M. Chen, Inference Based Classifier: Efficient Construction of Decision Trees for Sparse Categorical Attributes, DaWaK, pp.182-191, 2003.
DOI : 10.1007/978-3-540-45228-7_19

M. Nassar, O. Dabbebi, R. Badonnel, and O. Festor, Risk management in VoIP infrastructures using support vector machines, 2010 International Conference on Network and Service Management, pp.48-55
DOI : 10.1109/CNSM.2010.5691338

URL : https://hal.archives-ouvertes.fr/inria-00530167

P. O. Doherty, M. Ranganathan, and . Jain, Serving the developer community. http://www-x.antd.nist.gov/proj Adaptive building of decision trees by reinforcement learning, Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications, pp.34-39, 2007.

F. J. Provost and D. N. Hennessy, Scaling up: Distributed machine learning with cooperation, Proceedings of the Thirteenth National Conference on Artificial Intelligence, pp.74-79, 1996.

J. R. Quinlan, C4.5: programs for machine learning, 1993.

V. M. Quinten, R. Van-de-meent, and A. Pras, Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of 13th Open European Summer School EUNICE 2007, 2007.
DOI : 10.1007/978-3-540-73530-4_9

J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner et al., Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.329

J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson et al., RFC3261: SIP: Session initiation protocol, 2002.

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006.
DOI : 10.1109/GLOCOM.2006.192

Y. Soupionis, G. Tountas, and D. Gritzalis, Audio CAPTCHA for SIP-Based VoIP, Emerging Challenges for Security, Privacy and Trust IFIP Advances in Information and Communication Technology, pp.25-38, 2009.
DOI : 10.1126/science.1160379

J. P. Sterbenz, D. Hutchison, E. K. Cetinkaya, A. Jabbar, J. P. Rohrer et al., Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines, Computer Networks, vol.54, issue.8, pp.1245-1265, 2010.
DOI : 10.1016/j.comnet.2010.03.005

G. Williams, Inducing and Combining Multiple Decision Trees, 1990.

Y. Wu, S. Bagchi, N. Singh, and R. Wita, Spam detection in voice-over-IP calls through semi-supervised clustering, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.307-316, 2009.
DOI : 10.1109/DSN.2009.5270323