Issues and challenges in securing VoIP

[1]  W. Hardaker Internet Engineering Task Force (ietf) , 2011 .

[2]  Dimitris Gritzalis,et al.  An Adaptive Policy-Based Approach to SPIT Management , 2008, ESORICS.

[3]  Dimitris Gritzalis,et al.  A SIP-oriented SPIT Management Framework , 2008, Comput. Secur..

[4]  Ram Dantu,et al.  Nuisance level of a voice call , 2008, TOMCCAP.

[5]  Charles V. Wright,et al.  Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[6]  Giannis F. Marias,et al.  SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.

[7]  Vitaly Shmatikov,et al.  Security Analysis of Voice-over-IP Protocols , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[8]  Giannis F. Marias,et al.  Threat Analysis of the Session Initiation Protocol Regarding Spam , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[9]  Ram Dantu,et al.  Fast Worm Containment Using Feedback Control , 2007, IEEE Transactions on Dependable and Secure Computing.

[10]  Ram Dantu,et al.  Socio-technical defense against voice spamming , 2007, TAAS.

[11]  Nilanjan Banerjee,et al.  Anti-vamming trust enforcement in peer-to-peer VoIP networks , 2006, IWCMC '06.

[12]  Elisabetta Carrara,et al.  The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP) , 2006, RFC.

[13]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[14]  R. MacIntosh,et al.  Detection and mitigation of spam in IP telephony networks using signaling protocol analysis , 2005, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005..

[15]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[16]  Y. Rebahi,et al.  SIP Service Providers and The Spam Problem , 2005 .

[17]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[18]  B. Goode,et al.  Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.

[19]  Luca Veltri,et al.  SIP security issues: the SIP authentication procedure and its processing load , 2002, IEEE Netw..

[20]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[21]  M. C. Revett,et al.  Network computing , 1997 .

[22]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[23]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[24]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[25]  A.E. Klietz,et al.  Network supercomputing , 1992, IEEE Network.

[26]  R. Dantu,et al.  Detecting Phishing in Emails , .