A Graph Based Approach Toward Network Forensics Analysis, ACM Transactions on Information and System Security, vol.12, issue.1, pp.1-33, 2008. ,
DOI : 10.1145/1410234.1410238
Network forensics based on fuzzy logic and expert system, Computer Communications, vol.32, issue.17, pp.1881-1892, 2009. ,
DOI : 10.1016/j.comcom.2009.07.013
Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, vol.1, 2002. ,
Passive network forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.99-111, 2008. ,
DOI : 10.1145/1368506.1368520
Network forensics analysis, IEEE Internet Computing, vol.6, issue.6, pp.60-66, 2002. ,
DOI : 10.1109/MIC.2002.1067738
Voice over ip: Risks, threats, and vulnerabilities, International Conference on Information Systems Security (ICISS), 2009. ,
Advanced Fingerprinting For Inventory Management, INRIA, Research Report, 2009. ,
Automated Behavioral Fingerprinting, Recent Advances in Intrusion Detection, 2009. ,
DOI : 10.1007/978-3-642-04342-0_10
RFC: Augmented BNF for Syntax Specifications: ABNF, " United States, 1997. ,
Support Vector Machines: Theory and Applications, ser. Studies in Fuzziness and Soft Computing, 2005. ,
Polynomial-time metrics for attributed trees, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.27, issue.7, pp.1087-1099, 2005. ,
DOI : 10.1109/TPAMI.2005.146
RFC: SIP: Session Initiation Protocol United States, 2002. ,
Automated Behavioral Fingerprinting, 12th International Symposium on Recent Advances in Intrusion Detection (RAID), 2009. ,
DOI : 10.1007/978-3-642-04342-0_10
Assessing the accuracy of prediction algorithms for classification: an overview, Bioinformatics, vol.16, issue.5, pp.412-436, 2000. ,
DOI : 10.1093/bioinformatics/16.5.412
Probing TCP Implementations, USENIX Summer, pp.245-255, 1994. ,
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. USA: Insecure, 2009. ,
FiG: Automatic Fingerprint Generation, Distributed System Security Conference, 2007. ,
Unexpected means of protocol inference, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, 2006. ,
DOI : 10.1145/1177080.1177123
Internet traffic classification demystified, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, 2008. ,
DOI : 10.1145/1544012.1544023
SIP Stack Fingerprinting and Stack Difference Attacks, Black Hat Briefings, 2006. ,
Incorporating Active Fingerprinting into SPIT Prevention Systems, Annual VoIP Security Workshop, 2006. ,
Advanced Network Fingerprinting, Recent Advances in Intrusion Detection, 2008. ,
DOI : 10.1007/978-3-540-87403-4_20
URL : https://hal.archives-ouvertes.fr/inria-00326054