A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Social Consequences of Internet Use: Access, Involvement, and Interaction
Social Consequences of Internet Use: Access, Involvement, and Interaction
Combining Pattern Classifiers: Methods and Algorithms
Combining Pattern Classifiers: Methods and Algorithms
Benchmarking graph-based clustering algorithms
Image and Vision Computing
A Survey of Voice over IP Security Research
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Voice-over-IP Security: Research and Practice
IEEE Security and Privacy
The impact of network convergence on telecommunications software
IEEE Communications Magazine
On Spam over Internet Telephony (SPIT) Prevention
IEEE Communications Magazine
Improved multilevel security with latent semantic indexing
Expert Systems with Applications: An International Journal
An anomaly-based approach to the analysis of the social behavior of VoIP users
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
In the vision of both researchers and standardization committees, networks and services will evolve in the direction of increasing pervasiveness, convergence, and quality of service management capability. Consequently, users will gain an increasing dependency on the presence and availability of network connectivity and the huge plethora of provided services. Yet fostering the development of our society, such dependency on a relatively young technology poses serious threats, especially from the trustworthiness, security and privacy point of view. In this paper, we will describe and critically evaluate user behavior clustering aimed at monitoring and assuring the security of NGN-based applications. Different models of user behavior, developed within both ISP and academic research projects will be described, and several techniques for manipulating and exploiting such model for the anomaly detection purpose will be described and evaluated.