{"id":"https://openalex.org/W2533334917","doi":"https://doi.org/10.1109/wifs.2010.5711450","title":"Digital forensics in VoIP networks","display_name":"Digital forensics in VoIP networks","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2533334917","doi":"https://doi.org/10.1109/wifs.2010.5711450","mag":"2533334917"},"language":"en","primary_location":{"id":"doi:10.1109/wifs.2010.5711450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711450","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/inria-00548768","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035034365","display_name":"J\u00e9r\u00f4me Fran\u00e7ois","orcid":"https://orcid.org/0000-0002-7457-458X"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Jerome Francois","raw_affiliation_strings":["Reliability and Trust, University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Reliability and Trust, University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069228908","display_name":"Radu State","orcid":"https://orcid.org/0000-0002-4751-9577"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Radu State","raw_affiliation_strings":["SECAN-LAB, University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"SECAN-LAB, University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009071576","display_name":"Thomas Engel","orcid":"https://orcid.org/0000-0002-7374-3927"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thomas Engel","raw_affiliation_strings":["SECAN-LAB, University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"SECAN-LAB, University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080464551","display_name":"Olivier Festor","orcid":"https://orcid.org/0000-0002-3181-7967"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Festor","raw_affiliation_strings":["INRIA Nancy - Grand Est Research Center, Villers-les-Nancy, France"],"affiliations":[{"raw_affiliation_string":"INRIA Nancy - Grand Est Research Center, Villers-les-Nancy, France","institution_ids":["https://openalex.org/I4210127166","https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035034365"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.4655,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.77619751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"177","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9034125804901123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8205013275146484},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6128508448600769},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6008543372154236},{"id":"https://openalex.org/keywords/signaling-protocol","display_name":"Signaling protocol","score":0.5534124374389648},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5332538485527039},{"id":"https://openalex.org/keywords/syntax","display_name":"Syntax","score":0.45180925726890564},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4042642116546631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35658952593803406},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2245216965675354},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1653551459312439},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12568509578704834},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.09899798035621643}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9034125804901123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8205013275146484},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6128508448600769},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6008543372154236},{"id":"https://openalex.org/C2779681207","wikidata":"https://www.wikidata.org/wiki/Q203087","display_name":"Signaling protocol","level":3,"score":0.5534124374389648},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5332538485527039},{"id":"https://openalex.org/C60048249","wikidata":"https://www.wikidata.org/wiki/Q37437","display_name":"Syntax","level":2,"score":0.45180925726890564},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4042642116546631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35658952593803406},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2245216965675354},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1653551459312439},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12568509578704834},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.09899798035621643},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/wifs.2010.5711450","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs.2010.5711450","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE International Workshop on Information Forensics and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:inria-00548768v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00548768","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Workshop on Information Forensics and Security - WIFS'10, Dec 2010, Seattle, United States. pp.6","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00548768v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00548768","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Workshop on Information Forensics and Security - WIFS'10, Dec 2010, Seattle, United States. pp.6","raw_type":"Conference papers"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W22266696","https://openalex.org/W934236670","https://openalex.org/W1486443221","https://openalex.org/W1548163515","https://openalex.org/W1555085660","https://openalex.org/W1576185228","https://openalex.org/W1598169875","https://openalex.org/W1602614289","https://openalex.org/W2001479375","https://openalex.org/W2007625919","https://openalex.org/W2010573219","https://openalex.org/W2011628134","https://openalex.org/W2091504194","https://openalex.org/W2107432340","https://openalex.org/W2116666322","https://openalex.org/W2133148894","https://openalex.org/W2140494000","https://openalex.org/W2148346742","https://openalex.org/W2289700367","https://openalex.org/W4242138061","https://openalex.org/W4300955549","https://openalex.org/W6629032807","https://openalex.org/W6635785157","https://openalex.org/W6696172813"],"related_works":["https://openalex.org/W4213123701","https://openalex.org/W2901181907","https://openalex.org/W2543302771","https://openalex.org/W2624141182","https://openalex.org/W2168053229","https://openalex.org/W1593056500","https://openalex.org/W2739896159","https://openalex.org/W2046862178","https://openalex.org/W2134688343","https://openalex.org/W2688748055"],"abstract_inverted_index":{"With":[0],"VoIP":[1,11,39],"being":[2],"deployed":[3],"on":[4,44,66],"large":[5],"scale,":[6],"forensic":[7,105],"analysis":[8],"of":[9,14,31,78],"captured":[10,38],"traffic":[12],"is":[13],"major":[15],"practical":[16],"interest.":[17],"In":[18],"this":[19],"paper,":[20],"we":[21,54],"present":[22],"a":[23,81],"new":[24],"fingerprinting":[25],"approach":[26],"that":[27,79],"identifies":[28],"the":[29,45,61,90],"types":[30],"devices":[32],"(name,":[33],"version,":[34],"brand,":[35],"series)":[36],"in":[37,95],"traffic.":[40],"We":[41,84],"focus":[42],"only":[43,56],"signaling":[46,58],"plane":[47],"and":[48,70],"discard":[49],"voice":[50],"related":[51],"data.":[52],"Although":[53],"consider":[55],"one":[57],"protocol":[59,77],"for":[60,104],"illustration,":[62],"our":[63,87],"tool":[64,88],"relies":[65],"structural":[67],"information":[68],"trees":[69],"can":[71],"easily":[72],"be":[73],"adapted":[74],"to":[75,97,101],"any":[76],"has":[80],"known":[82,92],"syntax.":[83],"have":[85],"integrated":[86],"within":[89],"well":[91],"tshark":[93],"application":[94],"order":[96],"provide":[98],"an":[99],"easy":[100],"use":[102],"support":[103],"analysts.":[106]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
