[1]
Jan Seedof. Concepts of interception in a generic network architecture, IPTCOMM2008 Heidelberg, Germany, 2001. 7.
Google Scholar
[2]
Sun, Haichang Hao, Guiying Liu, Feng Li, Zhiyon. A study of legitimately intercepts model in the Internet. Micro-PC Information vo22, (2006).
Google Scholar
[3]
Xingye Tan, Yon Zhang, Zhenming Lei. A New Fast Packet Classification Algorithm: RC-FST, High Performance Switching and Routing, pages 462-466, (2005).
DOI: 10.1109/hpsr.2005.1503275
Google Scholar
[4]
T Lakshman, D Sti liadis. High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching, ACM SIGCOMM' 98, 1998 . 203- 214.
DOI: 10.1145/285243.285283
Google Scholar
[5]
Zhenqiang Li, Shengliang Zhang, Yan Ma, Xiaoyu Zhao. Multiple Decision Tree Algorithm for Packet Classification, Journal of Electronics & Information Technology, 30(4), (2008).
DOI: 10.3724/sp.j.1146.2006.01431
Google Scholar
[6]
Y. Qi, L. Xu, B. Yang, Y. Xue, and J. Li. Packet Classification Algorithms: From Theory to Practice. In Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM'09), pages 648 – 656, (2009).
DOI: 10.1109/infcom.2009.5061972
Google Scholar
[7]
Balajee Vamanan, Gwendolyn Voskuilen and T. N. Vijaykumar. EffiCuts: Optimizing Packet Classification for Memoryand Throughput. In Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM , (2010).
DOI: 10.1145/1851182.1851208
Google Scholar
[8]
P. Gupta and N. McKeown. Classifying Packets with Hierarchical Intelligent Cuttings. IEEE Micro, 20(1): 34 – 41, (2000).
DOI: 10.1109/40.820051
Google Scholar
[9]
Lawful Interception For IP Networks White Paper, Aqsacom Document No. 040451, (2005).
Google Scholar
[10]
Cisco Systems,Cisco Architecture for Lawful Interception in IP Networks, 10. (2004).
Google Scholar
[11]
Telecommunications security: Lawful Interception (LI), ETSI TR 101 943 V1. 1. 1.
Google Scholar
[12]
Lawful Interception Technology White Paper, Hangzhou H3C Technologies Co., Ltd.
Google Scholar