1 |
IDC Document(2003), IP Telephony Market Forecast and Analysis
|
2 |
Allied Business Intelligence Inc(2004), VoIP Equipment for Service Providers and Enterprises
|
3 |
Allied Business Intelligence Inc(2004), VoIP Equipment for Service Providers and Enterprises. pp.115-143, 2005
|
4 |
Hamdy A. Taha, 'Operations Research An Introduction 4ed', Prentice Hall International Editions, pp.221-251, 2002
|
5 |
IDC Document(2003), IP Telephony Market Forecast and Analysis, pp.138-156, 2004
|
6 |
E. Biermann, E. Cloete, L.M. Venter, 'A comparison of Intrusion Detection systems', Computers & Security, 20, pp354-362, 2001
|
7 |
N. Ye, Q. Chen, S. Vibert, 'Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection', IEEE Transactions of computers, Vol. 51, No. 7, pp.424-447, July, 2003
|
8 |
IDC Document AP(2004), Asia/Pacific VoIP Market Forecast and Analysis, pp.207-251, 2005
|
9 |
Paolo Garbolino, Franco Taroni, 'Evaluation of scientific evidence using Bayesian Networks', Forensic Science International 125, pp.228-244, 2002
|
10 |
Robert K. Cunningham, Craig S. Stevenson, 'Accurately Detecting Source' Code of Attacks That Increase Privilege', Recent Advances in Intrusion Detection (RAID), pp.206-217, 2003
|
11 |
IDC Document AP(2004), Asia/Pacific VoIP Market Forecast and Analysis
|