[1]Robert M, Dmitri V. Detection and Mitigation of Spam in IP Telephony Networks Using Signaling Protocol Analysis[C]//Proc. of Advances in Wired and Wireless Communication. New York, USA: IEEE Press, 2005: 135-139. [2]Gritzalis D, Mallios Y. A SIP-oriented SPIT Management Framework[J]. Computers & Security, 2008, 27(1): 36-53. [3]Rosenberg J, Schulzrinne H. Reliability of Provisional Responses in the Session Initiation Protocol(SIP)[S]. RFC 3262, 2002. [4]Rosenberg J, Jennings C, Peterson J. The Session Initiation Protocol and Spam Draft[Z]. IETF Group, 2007. [5]何培舟, 孙 勇, 郑 伟, 等. FMC 融合网络中的SPIT过滤技术研究[J]. 通信技术, 2007, 40(7): 13-15. [6]Ram D, Prakash K. Detecting Spam in VoIP Networks[C]//Proc. of SRUTI’05. Cambridge, USA: [s. n.], 2005: 31-37. [7]Prakash K, Ram D. Social Technical Defense Against Voice Spamming[J]. ACM Transactions on Autonomous and Adaptive Systems, 2007, 2(1): 1-44. [8]何光宇, 闻英友, 赵 宏. 基于反馈评判的SPIT检测与防范方法[J]. 东北大学学报, 2009, 30(4): 526-530. [9]Schwartz D, Sterman B, Katz E, et al. SPAM for Internet Telephony(SPIT) Prevention Using the Security Assertion Markup Language(SAML)[Z]. IETF Group, 2006. [10]Cao Fei, Jennings C. Providing Response Identity and Authen- ticaction in IP Telephony[C]//Proc. of the 1st International Conference on Availability. Vienna, Austria: [s. n.], 2006: 198-205. [11]Daswani N, Jain R. An Experimental Study of the Skype Peer-to-Peer VoIP System[C]//Proc. of the 5th Workshop on Peer-to-Peer Systems. Santa Barbara, USA: [s. n.], 2006. [12]Mazurczyk W, Cabaj K, Szczypiorski K. What Are Suspicious VoIP Delays[C]//Proc. of the 28th IEEE International Conference on Computer Communications. [S. l.]: IEEE Press, 2009: 1-17. [13]Witten I H, Frank E. Data Mining Practical Machine Learning Tools and Techniques[M]. 2nd ed. 北京: 机械工业出版社, 2005. [14]Lewis D D. Naive(Bayes) at Forty: The Independence Assumption in Information Retrieval[C]//Proc. of the 10th European Conf. on Machine Learning. New York, USA: Springer, 1998.
|