RFC: Simple network management protocol (snmp) United States, 1990. ,
RFC: SIP: Session Initiation Protocol United States, 2002. ,
Abusing SIP Authentication, 2008 The Fourth International Conference on Information Assurance and Security, pp.237-242, 2008. ,
DOI : 10.1109/IAS.2008.29
URL : https://hal.archives-ouvertes.fr/inria-00405356
Support Vector Machines: Theory and Applications, ser. Studies in Fuzziness and Soft Computing, 2005. ,
A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB Journal, vol.1, issue.2, pp.507-521, 2007. ,
DOI : 10.1007/s00778-006-0002-5
Monitoring SIP Traffic Using Support Vector Machines, 11th International Symposium on Recent advances in intrusion detection -RAID 2008, pp.311-330, 2008. ,
DOI : 10.1007/978-3-540-87403-4_17
URL : https://hal.archives-ouvertes.fr/inria-00325290
A decision based oneagainst-one method for multi-class support vector machine, Pattern Anal. Appl, vol.7, issue.2, pp.164-175, 2004. ,
A comparison of methods for multiclass support vector machines, Neural Networks IEEE Transactions on, vol.13, issue.2, pp.415-425, 2002. ,
An introduction to support Vector Machines: and other kernel-based learning methods, 2000. ,
DOI : 10.1017/CBO9780511801389
A Survey of Clustering Data Mining Techniques, Grouping Multidimensional Data, pp.25-71, 2006. ,
DOI : 10.1007/3-540-28349-8_2
QROCK: A quick version of the ROCK algorithm for clustering of categorical data, Pattern Recognition Letters, vol.26, issue.15, pp.2364-2373, 2005. ,
DOI : 10.1016/j.patrec.2005.04.008
Polynomial-time metrics for attributed trees, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.7, pp.1087-1099, 2005. ,
DOI : 10.1109/TPAMI.2005.146
Augmented BNF for Syntax Specifications: ABNF, " United States, 1997. ,
SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006. ,
Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412
Binary codes capable of correcting deletions, insertions and reversals, Soviet Physics Doklady, vol.10, 1966. ,
Probing TCP Implementations, USENIX Summer, pp.245-255, 1994. ,
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009. ,
FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007. ,
Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08 ,
DOI : 10.1145/1544012.1544023
Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.313-326, 2006. ,
DOI : 10.1145/1177080.1177123
ACAS, Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data , MineNet '05, pp.197-202, 2005. ,
DOI : 10.1145/1080173.1080183
Incorporating Active Fingerprinting into SPIT Prevention Systems, Third Annual VoIP Security Workshop, 2006. ,
Automated Behavioral Fingerprinting, 12th International Symposium on Recent advances in intrusion detection -RAID 2009, 2009. ,
DOI : 10.1007/978-3-642-04342-0_10
Advanced Network Fingerprinting , " in Recent Advances in Intrusion Detection Lecture Notes in Computer Science Computer Science, ser, Computer Science, vol.5230, pp.372-389, 2008. ,
Incorporation of Application Layer Protocol Syntax into Anomaly Detection, ICISS '08: Proceedings of the 4th International Conference on Information Systems Security, pp.188-202, 2008. ,
DOI : 10.1007/978-3-540-30143-1_11
Machine learning for application-layer intrusion detection, 2009. ,
Convolution kernels for natural language, Advances in Neural Information Processing Systems, 2001. ,