|
[1]S. A. Baset and H. G. Schulzrinne, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol,” Proc. of IEEE INFOCOM’06, Barcelona, Spain, Apr. 2006. [2]Lubos Ptacek, "Analysis and detection of Skype network traffic," M.S.thesis, Dept. Informatics. Eng., Masaryk Univ., Brno, Czech Republic [3]P. Biondi and F. Desclaux, “Silver needle in the Skype,” in Black Hat Europe’06, Amsterdam, the Netherlands, Mar. 2006 [4]B. Trammell, E. Boschi, G. Procissi, C. Callegari, P. Dorfnger, and D. Schatzmann, “Identifying Skype Traffic in a Large-Scale Flow Data Repository” In Proceedings of the Third COST TMA International Workshop on Traffic Monitoring and Analysis (TMA 2011), Vienna Austria, Apr 2011 [5]D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, “Detailed Analysis of Skype Traffic”, IEEE Transactions on Multimedia, Vol. 11, No.1, Jan 2009 [6]S. Ehlert and S. Petgang, “Analysis and signature of Skype VoIP session traffic”, Technical Report NGNI-SKYPE-06b, Fraunhofer FOKUS, Berlin, Germany [7]F. Desclaux and K. Kortchinsky. “Vanilla Skype part 2,” in Recon, Montreal, Canada, June 2006 [8]D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, P. Tofanelli, Revealing Skype traffic: when randomness plays with you, in Proceedings of the 2007 ACM SIGCOMM, August 2007 [9]William Stallings, “Cryptography and Network Security: Principles and Practice” 4/E, 2006 [10]Skype Privacy and security https://support.skype.com/en-us/faq/FA31/does-skype-use-encryption [11]The Programming Language Lua, [online] Available: http://www.lua.org [12]Lua - The Wireshark Wiki http://wiki.wireshark.org/Lua/ [13]Serice names and port numbers are assigned by IANA http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml [14]IP Tracing and IP Tracking http://www.ip-adress.com/ip_tracer/ [15]Wireshark目前有支援的通訊協定 http://www.wireshark.org/docs/dfref/ [16]Skype整併到Microsoft的官方聲明 http://www.microsoft.com/zh-tw/skype/
|