[1] Poikselka M. The IMS: IP Multimedia Concepts and Services in the Mobile Domain[M]. [S. l.]: John Wiley & Sons, 2004.
[2] Rosenberg J, Schulzrinne H, Camanilo G. SIP: Session Initiation Protocol[S]. RFC 3261, 2002.
[3] Awais A, Farooq M, Javed M Y. Attack Analysis Bio-inspired Security Framework for IP Multimedia Subsystem[C]//Proc. of GECCO’08. [S. l.]: ACM Press, 2008.
[4] Farooqi A H, Munir A. Intrusion Detection System for IP Multi- media Subsystem Using K-nearest Neighbor Classifier[C]//Proc. of INMIC’08. [S. l.]: IEEE Press, 2008.
[5] Tang Jin, Cheng Yu. Quick Detection of Stealthy SIP Flooding Attacks in VoIP Networks[C]//Proc. of ICC’11. Kyoto, Japan: [S. l.], 2011.
[6] 王尚广, 孙其博, 杨放春. IMS网络中的SIP 洪泛攻击检测[J].软件学报, 2011, 22(4): 761-772.
[7] Sher M. Secure Service Provisioning(SSP) Framework for IP Multimedia Subsystem(IMS)[D]. Berlin, Germany: Technical University of Berlin, 2007.
[8] 田 园, 李建斌, 张 振. 一种逆向分析协议状态机模型的有效方法[J]. 计算机工程与应用, 2011, 47(19): 63-67.
[9] Narendra K S, Xiang Cheng. Adaptive Control of Discrete-time Systems Using Multiple Models[J]. IEEE Trans. on Automatic Control, 2000, 45(9): 1669-1686. |