[1] Salehin S, Ventura N. Blocking unsolicited voice calls using decoys for the IMS//ICC’07. Glasgow: , 2007: 1961-1966.<br>[2] Rosenberg J, Jennings C. RFC 5039, the session initiation protocol (SIP) and spam[S]. : IETF, 2008.<br>[3] 刘明川, 彭长生. 基于贝叶斯概率模型的邮件过滤算法探讨[J]. 重庆邮电学院学报: 自然科学版, 2005, 17(5): 636-639. Liu Mingchuan, Peng Changsheng. Research on mail filter algorithm based on Bayes probability model[J]. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2005, 17(5): 636-639.<br>[4] Nassar M, State R, Festor O. VoIP honeypot architecture//IM’07. Munich: , 2007: 109-118.<br>[5] Kusumoto T, Chen E Y, Itoh M. Using call patterns to detect unwanted communication callers//SAINT’09. Bellevue: , 2009: 64-70.<br>[6] ITU. ITU-T Recommendation P.59, Telephone transmission quality objective measuring apparatus-artificial conversational speech[S]. : ITU, 1993.<br>[7] Hammer F, Reichl P, Raake A. Elements of interactivity in telephone conversations//ICSLP’04. Jeju Island: , 2004: 1741-1744.<br>[8] Quittek J, Niccolini S, Tartarelli S, et al. Detecting SPIT calls by checking human communication patterns//ICC’07. Glasgow: , 2007: 1979-1984.<br>[9] 黄玮, 梁洪亮, 胡正名, 等. VoIP网络边界攻击防护系统设计和实现[J]. 清华大学学报, 2009, 25(2): 2215-2221. Huang Wei, Liang Hongliang, Hu Zhengming, et al. Design and implementation of VoIP network perimeter defense system[J]. Journal of Tsinghua University, 2009, 25(2): 2215-2221. |