Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
Dual-track protocol reverse analysis based on share learning
W Zhang, X Meng, Y Zhang - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
Private protocols, whose specifications are agnostic, are widely used in the Industrial
Internet. While providing customized service, they also raise essential security concerns as …
Internet. While providing customized service, they also raise essential security concerns as …
ProWord: An unsupervised approach to protocol feature word extraction
Z Zhang, Z Zhang, PPC Lee, Y Liu… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Protocol feature words are byte subsequences within traffic payload that can distinguish
application protocols, and they form the building blocks of many constructions of deep …
application protocols, and they form the building blocks of many constructions of deep …
Toward unsupervised protocol feature word extraction
Z Zhang, Z Zhang, PPC Lee, Y Liu… - IEEE Journal on …, 2014 - ieeexplore.ieee.org
Protocol feature words are byte subsequences within traffic payload that can distinguish
application protocols, and they form the building blocks of many constructions of deep …
application protocols, and they form the building blocks of many constructions of deep …
[PDF][PDF] Intrusion Detection and Prevention System for Secure Multimedia sharing in Future Internet
IP Multimedia Subsystem (IMS) supports high-speed transmission of multi-media like data,
audio, and video between mobiles and other wireless devices. IMS is the most suitable for …
audio, and video between mobiles and other wireless devices. IMS is the most suitable for …
Review of syn-flooding attack detection mechanism
Denial of Service (DoS) is a security threat which compromises the confidentiality of
information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP …
information stored in Local Area Networks (LANs) due to unauthorized access by spoofed IP …
A machine learning approach for prediction of signaling sip dialogs
In this paper, we propose a machine learning methodology for prediction of signaling
sessions established with the Session Initiation Protocol (SIP). Given the increasing …
sessions established with the Session Initiation Protocol (SIP). Given the increasing …
Detection of abnormal sip signaling patterns: a deep learning comparison
This paper investigates the detection of abnormal sequences of signaling packets purposely
generated to perpetuate signaling-based attacks in computer networks. The problem is …
generated to perpetuate signaling-based attacks in computer networks. The problem is …
On the use of svms to detect anomalies in a stream of sip messages
Voice and multimedia communications are rapidly migrating from traditional networks to
TCP/IP networks (Internet), where services are provisioned by SIP (Session Initiation …
TCP/IP networks (Internet), where services are provisioned by SIP (Session Initiation …
Classification of SIP messages by a syntax filter and SVMs
The Session Initiation Protocol (SIP) is at the root of many sessions-based applications such
as VoIP and media streaming that are used by a growing number of users and …
as VoIP and media streaming that are used by a growing number of users and …