VoIP Security and Privacy Threat Taxonomy, 2005. ,
Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
Automated runtime risk management for voice over IP networks and services, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2010. ,
DOI : 10.1109/NOMS.2010.5488435
URL : https://hal.archives-ouvertes.fr/inria-00538675
RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004. ,
DOI : 10.1007/978-3-540-30143-1_16
Statistical Learning Theory, 1998. ,
Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines, Proceedings of the first Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp.71-82, 2004. ,
DOI : 10.1515/PIKO.2004.228
Visualization of anomaly detection using prediction sensitivity, Sicherheit, 2005. ,
Probabilistic Risk Analysis: Foundations and Methods, 2001. ,
DOI : 10.1017/CBO9780511813597
Risk Analysis in Engineering: Techniques, Trends, and Tools, Mohammad Modarres, 2006. ,
LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001. ,
DOI : 10.1145/1961189.1961199
Managing Risks at Runtime in VoIP Networks and Services, Proc. of the Autonomous Infrastructure, Management and Security (AIMS'10, 2010. ,
DOI : 10.1007/978-3-642-13986-4_11
URL : https://hal.archives-ouvertes.fr/inria-00538685
Network risk management using attacker profiling, Security and Communication Networks, pp.83-96, 2009. ,
DOI : 10.1002/sec.58
Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm, IEEE Network Magazine, vol.20, 2006. ,
Assessing the risk of intercepting VoIP calls, Computer Networks, vol.52, issue.12, 2008. ,
DOI : 10.1016/j.comnet.2008.05.001
ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006. ,
DOI : 10.1109/GLOCOM.2006.192
The CHAMPS system: change management with planning and scheduling, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004. ,
DOI : 10.1109/NOMS.2004.1317679
Computer-generated comprehensive risk assessment for IT project management, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2009. ,
DOI : 10.1109/NOMS.2010.5488498
Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007. ,
DOI : 10.1109/ICC.2007.329
Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of 13th Open European Summer School EUNICE 2007, 2007. ,
DOI : 10.1007/978-3-540-73530-4_9