|
|
|
|
Gurbani, Vijay
Lucent Technologies, Inc./Bell Laboratories
Naperville, Illinois
|
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 38
reviews
|
|
|
|
|
|
|
|
Probability and mathematical statistics: theory, applications, and practice in R Meyer M., SIAM-Society for Industrial and Applied Mathematics, Philadelphia, PA, 2019. 707 pp. Type: Book (978-1-611975-77-2)
Back when I was an undergraduate, I took a course in numerical recipes (in the C programming language). That course introduced me to the approximation of answers to questions that, often times, cannot be solved through analytical means...
|
Jan 7 2020 |
|
|
|
|
|
|
Machine learning with TensorFlow Shukla N., Manning Publications Co., Greenwich, CT, 2018. 272 pp. Type: Book (978-1-617293-87-0)
Machine learning with TensorFlow is a short book laid out in three parts. The first part (about 50 pages) gets the reader up to speed with today’s artificial intelligence (AI) and machine learning community. It also co...
|
May 23 2019 |
|
|
|
|
|
|
Being an applied computer scientist Gregory Abowd. YouTube, 00:45:24, published on Apr 21, 2016, Michigan Engineering, https://www.youtube.com/watch?v=Xuz5a4dtS0c. Type: Video
In this video, Abowd provides an excellent overview of being an applied computer scientist. The talk combines Abowd’s research interests with his personal quest that ubiquitous computing elements “weave themselves i...
|
Jun 13 2017 |
|
|
|
|
|
|
Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties Sultana N., Kohlweiss M., Moore A. HotMiddlebox 2016 (Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, Florianopolis, Brazil, Aug 22-26, 2016) 1-6, 2016. Type: Proceedings
Sultana et al. tackle the problem of remotely making measurements on a network over which the party conducting the reconnaissance has no control. Such scenarios are prevalent in cloud computing, where the subscriber to a cloud service ...
|
Mar 30 2017 |
|
|
|
|
|
|
Counting the security cost of cheap calls German P. Network Security 2015(11): 9-11, 2015. Type: Article
Session initiation protocol (SIP) trunking effectively allows enterprises and small businesses to continue leveraging their voice-over-IP (VoIP) infrastructure and related IP-based productivity suites (desktop sharing, web conferencing...
|
Jun 20 2016 |
|
|
|
|
|
|
SIPAD: SIP-VoIP anomaly detection using a stateful rule tree Seo D., Lee H., Nuwere E. Computer Communications 36(5): 562-574, 2013. Type: Article
The prevalence of the session initiation protocol (SIP) in communications networks has led to an increase in papers that study attacks against the protocol. The paper by Seo et al. uses a stateful rule tree to detect a malformed SIP at...
|
Apr 14 2014 |
|
|
|
|
|
|
Analysis of SIP-based threats using a VoIP honeynet system Hoffstadt D., Marold A., Rathgeb E. TrustCom 2012 (Proceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, UK, Jun 25-27, 2012) 541-548, 2012. Type: Proceedings
As the session initiation protocol (SIP) is increasingly deployed in telecommunications carrier networks, the threat of fraud associated with it rises. The most insidious of the frauds is toll fraud, whereby an imposter authenticates a...
|
Jul 2 2013 |
|
|
|
|
|
|
AdSIP: decentralized SIP for mobile ad hoc networks Yahiaoui S., Belhoul Y., Nouali-Taboudjemat N., Kheddouci H. WAINA 2012 (Proc. of 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, Fukuoka, Japan, Mar 26-29, 2012) 490-495, 2012. Type: Proceedings
This paper attempts to outline a novel method for supporting the session initiation protocol (SIP) over mobile ad hoc networks (MANETs). Because central entities in SIP (the domain name system (DNS), SIP proxy servers, and SIP registra...
|
Mar 19 2013 |
|
|
|
|
|
|
SIP steganalysis using chaos theory Zhao H., Zhang X. CMCSN 2012 (Proceedings of the 2012 International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, Jul 7-9, 2012) 95-100, 2012. Type: Proceedings
Steganography involves the concealment of unrelated information in a data stream. The authors of this paper propose the use of chaos theory to determine whether a certain information element used in session initiation protocol (SIP) si...
|
Jan 24 2013 |
|
|
|
|
|
|
Peer-to-peer computing: applications, architecture, protocols, and challenges Kwok Y., CRC Press, Inc., Boca Raton, FL, 2011. 216 pp. Type: Book (978-1-439809-34-1)
Kwok presents a thin though comprehensive monograph on the current state of peer-to-peer (P2P) research. Certain omissions are glaring, but by and large the treatment of the topic is extensive. A researcher or graduate student who woul...
|
Jan 31 2012 |
|
|
|
|
|
|
|
|
|
|
|