Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/conf/wetice/LeungC07>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Chun-Ming_Leung>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Yuen-Yan_Chan>
|
foaf:homepage
|
<http://dx.doi.org/doi.ieeecomputersociety.org%2F10.1109%2FWETICE.2007.160>
|
foaf:homepage
|
<https://doi.ieeecomputersociety.org/10.1109/WETICE.2007.160>
|
dc:identifier
|
DBLP conf/wetice/LeungC07
(xsd:string)
|
dc:identifier
|
DOI doi.ieeecomputersociety.org%2F10.1109%2FWETICE.2007.160
(xsd:string)
|
dcterms:issued
|
2007
(xsd:gYear)
|
rdfs:label
|
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics.
(xsd:string)
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Chun-Ming_Leung>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Yuen-Yan_Chan>
|
swrc:pages
|
401-408
(xsd:string)
|
dcterms:partOf
|
<https://dblp.l3s.de/d2r/resource/publications/conf/wetice/2007>
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/conf/wetice/LeungC07/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/conf/wetice/LeungC07>
|
rdfs:seeAlso
|
<http://dblp.uni-trier.de/db/conf/wetice/wetice2007.html#LeungC07>
|
rdfs:seeAlso
|
<https://doi.ieeecomputersociety.org/10.1109/WETICE.2007.160>
|
swrc:series
|
<https://dblp.l3s.de/d2r/resource/conferences/wetice>
|
dc:subject
|
Enterprise Network Security, Network Foren- sics, Traffic Analysis, Skype, Blocking, Traffic Prioritiza- tion, NAT Traversal, Reverse Engineering
(xsd:string)
|
dc:title
|
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics.
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Text>
|
rdf:type
|
swrc:InProceedings
|
rdf:type
|
foaf:Document
|