Working with SEC -the Simple Event Correlator. http://sixshooter.v6.thrupoint.net/ SEC-examples/article.html ,
An Intrusion-Detection Model, IEEE Symposium on Security and Privacy, pp.118-133, 1986. ,
Hacking VoIP Exposed, 2006. ,
Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002. ,
DOI : 10.1145/508791.508835
SPIT mitigation by a network level anti SPIT entity, Third annual security workshop (VSW'06, 2006. ,
Intrusion detections mechanisms for VoIP applications, Third annual security workshop (VSW'06, 2006. ,
VoIP Honeypot Architecture, 2007 10th IFIP/IEEE International Symposium on Integrated Network Management, 2007. ,
DOI : 10.1109/INM.2007.374775
URL : https://hal.archives-ouvertes.fr/inria-00149554
Third annual security workshop (VSW'06), 2006. ,
Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007. ,
DOI : 10.1109/ICC.2007.329
Real-tile Logfile Analysis Using the Simple Event Correlator (SEC), 18th USENIX System Administration Conference (LISA '04) Proccedings, pp.133-149, 2004. ,
Voice SPAM Control with Gray Leveling, 2nd Workshop on Securing Voice over IP, 2005. ,
SEC -A Lightweight Event Correltion Tool, Proceedings of the 2002 IEEE Workshop on IP operations and Management, pp.111-115, 2002. ,
VoIP security and privacy threat taxonomy Public Realease 1.0, 2005. ,
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004. ,
Incorporating Active Fingerprinting into SPIT Prevention Systems, Third annual security workshop (VSW'06, 2006. ,