Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, 2008. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
Advanced Network Fingerprinting, In: Recent Advances in Intrusion Detection, 2008. ,
DOI : 10.1007/978-3-540-87403-4_20
URL : https://hal.archives-ouvertes.fr/inria-00326054
Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412
FiG: Automatic Fingerprint Generation, Distributed System Security Conference, 2007. ,
A decision based one-against-one method for multiclass support vector machine, Pattern Anal. Appl, vol.7, issue.2, pp.164-175, 2004. ,
Advanced Fingerprinting For Inventory Management, 2009. ,
Behavioral and Temporal Fingerprinting, 2009. ,
ACAS, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, 2005. ,
DOI : 10.1145/1080173.1080183
Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, 2008. ,
DOI : 10.1145/1544012.1544023
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, 2009. ,
SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006. ,
Polynomial-time metrics for attributed trees, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.7, 2005. ,
Incorporating Active Fingerprinting into SPIT Prevention Systems, Third Annual VoIP Security Workshop, 2006. ,
Learning from labeled and unlabeled data with label propagation, Tech. rep, 2002. ,