N. Chaisamran, T. Okuda, G. Blanc, and S. Yamaguchi, Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships, 2011 IEEE/IPSJ International Symposium on Applications and the Internet, 2011.
DOI : 10.1109/SAINT.2011.84

N. Eagle, A. Pentland, and D. Lazer, Inferring friendship network structure by using mobile phone data, Proceedings of the National Academy of Sciences, vol.323, issue.5915, pp.15274-15278, 2009.
DOI : 10.1126/science.1167742

URL : http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2741241

P. Kolan and R. Dantu, Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007.
DOI : 10.1145/1216895.1216897

M. Nassar, O. Dabbebi, R. Badonnel, and O. Festor, Risk management in VoIP infrastructures using support vector machines, 2010 International Conference on Network and Service Management, pp.48-55, 2010.
DOI : 10.1109/CNSM.2010.5691338

URL : https://hal.archives-ouvertes.fr/inria-00530167

M. Nassar, S. Martin, G. Leduc, and O. Festor, Using decision trees for generating adaptive SPIT signatures, Proceedings of the 4th international conference on Security of information and networks, SIN '11, 2011.
DOI : 10.1145/2070425.2070431

URL : https://hal.archives-ouvertes.fr/hal-00644821

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proc. of RAID '08, pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

M. Nassar, R. State, and O. Festor, Labeled VoIP Data-Set for Intrusion Detection Evaluation, In: Proceedings of the 16th EUNICE/IFIP WG 6.6, 2010.
DOI : 10.1007/978-3-642-13971-0_10

URL : https://hal.archives-ouvertes.fr/inria-00497735

J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner et al., Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.329

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, SPIT prevention framework, IEEE GLOBECOM'06, pp.1-6, 2006.
DOI : 10.1109/glocom.2006.192

D. Shin, J. Ahn, and C. Shim, Progressive multi gray-leveling: a voice spam protection algorithm, IEEE Network, vol.20, issue.5, pp.18-24, 2006.
DOI : 10.1109/MNET.2006.1705879

Y. Soupionis, G. Tountas, and D. Gritzalis, Audio CAPTCHA for SIP-Based VoIP, In IFIP Adv. in Inf. & Com. Tech, vol.321, issue.5895, pp.25-38, 2009.
DOI : 10.1126/science.1160379

A. Wald, Sequential Tests of Statistical Hypotheses, The Annals of Mathematical Statistics, vol.16, issue.2, pp.117-186, 1945.
DOI : 10.1214/aoms/1177731118

A. Wald and J. Wolfowitz, Optimum Character of the Sequential Probability Ratio Test, The Annals of Mathematical Statistics, vol.19, issue.3, pp.326-339, 1948.
DOI : 10.1214/aoms/1177730197

Y. Wu, S. Bagchi, N. Singh, and R. Wita, Spam detection in voice-over-IP calls through semi-supervised clustering, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.307-316, 2009.
DOI : 10.1109/DSN.2009.5270323

H. Yan, K. Sripanidkulchai, H. Zhang, Z. Shae, and D. Saha, Incorporating active fingerprinting into spit prevention systems, Third annual security workshop, 2006.