[1]Skype, [online]. Available:http://www.skype.com/.
[2]L Deri, “Open Source VoIP Traffic Monitoring”, SANE 2006, May 2006.
[3]J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, "SIP: Session Initiation Protocol", IETF RFC 3261, June 2002.
[4]F. Andreasen and B. Foster, "Media Gateway Control Protocol (MGCP) Version 1.0", IETF RFC 3435, January 2003.
[5]ITU-T Recommendation H.323, "Packet-based multimedia communications systems", 2003.
[6]S. L. Garfinkel, “VoIP and Skype Security”, Skype Security Overview, January 2005.
[7]G. Prentice “Hello, we’re Skype – we really like big new ideas”, Skype Hardware Development & Business Opportunity Seminar, June 2006.
[8]Y. Gong, “Identifying P2P users using traffic analysis”, July 2005, [online]. Available:http://www.securityfocus.com/infocus/1843/.
[9]D. Bergström, “An analysis of Skype VoIP application for use in a corporate environment”, October 2004, [online]. Available:http://www.geocities.com/bergstromdennis/.
[10]S. A. Baset and H. G. Schulzrinne, “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol”, In Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.
[11]K. Suh, D. R. Figueriredo, J. Kurose, and D. Towsley, “Characterizing and detecting Skype relayed traffic: A case study using Skype”, In Proceedings of IEEE INFOCOM 2006, Barcelona, Spain, April 2006.
[12]J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, “STUN: Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs)”, RFC 3489, IETF, March 2003.
[13]B. Ford, P. Srisuresh, and D. Kegel, “Peer-to-peer communication across network address translators”, USENIX Annual Technical Conference, April 2005.
[14]J. Rosenberg, R. Mahy, and C. Huitema, Internet draft: “TURN—Traversal Using Relay NAT”, March 2006.
[15]S. Guha, N. Daswani, and R. Jain, “An experimental study of the Skype peer-to-peer VoIP system”, IPTPS., Santa Barbara, CA, February 2006.
[16]Global Index(GI), [online]. Available:http://www.skype.com/skype_p2pexplained.html/.
[17]Global IP Sound, [online]. Available:http://www.globalipsound.com/.
[18]邱家偉, 潘仁義, “網際網路電話動態頻寬保證之設計與實作”, 國立中正大學通訊工程研究所, 2005年碩士畢業論文.[19]ITU-T Recommendation P.800.1, “Mean opinion score (MOS) Terminology”, February 2003.
[20]J. Stephens, Iptables – How does it work? , [online]. Available:http://www.sns.ias.edu/~jns/security/iptables/iptables_conntrack.html.
[21]O. Andreasson, Iptables Tutorial 1.1.19, 2003, [online]. Available:http://www.faqs.org/docs/iptables/index.html.
[22]黃仲君, 孫雅麗, “設計與實作狀態化封包內容分類器的描述語言、編譯器,與引擎”, 國立台灣大學資訊管理研究所, 2004年碩士畢業論文.[23]R. Braden, D. Clark and S. Shenker, "Integrated Services in the Internet Architecture: an Overview", IETF RFC1633, June 1994.
[24]S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss, "An Architecture for Differentiated Services", IETF RFC 2475, December 1998.
[25]S. Floyd and V. Jacobson, "Link-Sharing and Resource Management Models for Packet Networks", IEEE/ACM Transactions on Networking, Vol. 3 No. 4, pp. 365-386, August 1995.
[26]HTB Home, [online]. Available: http://luxik.cdi.cz/~devik/qos/htb/.
[27]Class-Based Queuing, [online]. Available: http://www.icir.org/floyd/cbq.html.
[28]R. Braden, L. Zhang, S. Berson, S. Herzog and S. Jamin, "Resource Reservation Protocol(RSVP)Version 1 Functional Specification", IETF RFC 2205, Proposed Standard, September 1997.
[29]何振毅, 王欣平, “HTB與CBQ在Linux上階層性頻寬分享機制實作分析和探討”, 大葉大學資訊工程學系, 2004年碩士畢業論文.[30]Harvard Sentences, [online]. Available: http://www.cs.columbia.edu/~hgs/audio/harvard.html.
[31]ITU-T, “G.107 The E-model, a computational model for use in transmission planning”, ITU-T, March 2005.
[32]J. Mercier, “Is the Growth of Skype Slowing Down?”, Skype Journal, May 2005, [online]. Available: http://www.skypejournal.com/blog/archives/2005/05/is_the_growth_o.php
[33]郭伯臣, “統計樣式辨認於測驗資料之應用”, 測驗統計年刊第十三輯, December 2005.
[34]張智星, “資料分群與樣式辨認(Data Clustering and Pattern Recognition)” , [online]. Available: http://neural.cs.nthu.edu.tw/jang/books/dcpr/.
[35]l7-filter uses the Skype to Skype pattern, [online]. Available: http://l7-filter.sourceforge.net/layer7-protocols/protocols/skypetoskype.pat.
[36]莊樹諄, “VOIP:網路電話發展概況簡介” , 中央研究院計算中心通訊第17卷25期, December 2001.
[37]F. Cuervo, N. Greene, A. Rayhan, C. Huitema, B. Rosen and J. Segers, “Megaco Protocol Version 1.0”, IETF RFC 3015, November 2000.
[38]D. Awduche, J. Malcolm, J. Agogbua, M. O'Dell and J. McManus, “Requirements for Traffic Engineering Over MPLS”, IETF RFC 2702, September 1999.
[39]R. Russell, “Linux Netfilter Hacking HOWTO”, February 2002, [online]. Available: http://www.collaborium.org/onsite/benin/docs/services/NETFILTER_RELATED/netfilter-hacking/netfilter-hacking-HOWTO.html#toc4
[40]A. Clark, “Voice Quality Measurement”, February 2005, [online]. Available: http://www.tmcnet.com/tmcnet/articles/2005/voice-quality-measurement-voip-alan-clark-telchemy.htm.
[41]W. J. Campbell, “Learning Skype Plug-In Architecture”, Skype Journal, April 2005.
[42]E. Mattila, “An Analysis of Hybrid and Pure Peer-to-Peer Technologies for IP Telephony”, Helsinki University of Technology, April 2005.
[43]G. Lisha and L. Junzhou, “Performance Analysis of a P2P-Based VoIP Software”, AICT-ICIW 2006, February 2006.
[44]K. T. Chen, C. Y. Huang, P. Huang and C. L. Lei, “Quantifying Skype User Satisfaction”, In Proceedings of ACM SIGCOMM 2006, Pisa, Italy, September 2006.
[45]毛治國, “電信業面臨「一場正在形成中的完美風暴」”, 2005 IP電信產業交流會, [online]. Available: http://www.teema.org.tw/publish/moreinfo.asp?autono=2491