Issues and challenges in securing VoIP
暂无分享,去创建一个
Henning Schulzrinne | Ram Dantu | Sonia Fahmy | João W. Cangussu | H. Schulzrinne | R. Dantu | S. Fahmy
[1] W. Hardaker. Internet Engineering Task Force (ietf) , 2011 .
[2] Dimitris Gritzalis,et al. An Adaptive Policy-Based Approach to SPIT Management , 2008, ESORICS.
[3] Dimitris Gritzalis,et al. A SIP-oriented SPIT Management Framework , 2008, Comput. Secur..
[4] Ram Dantu,et al. Nuisance level of a voice call , 2008, TOMCCAP.
[5] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[6] Giannis F. Marias,et al. SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.
[7] Vitaly Shmatikov,et al. Security Analysis of Voice-over-IP Protocols , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[8] Giannis F. Marias,et al. Threat Analysis of the Session Initiation Protocol Regarding Spam , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[9] Ram Dantu,et al. Fast Worm Containment Using Feedback Control , 2007, IEEE Transactions on Dependable and Secure Computing.
[10] Ram Dantu,et al. Socio-technical defense against voice spamming , 2007, TAAS.
[11] Nilanjan Banerjee,et al. Anti-vamming trust enforcement in peer-to-peer VoIP networks , 2006, IWCMC '06.
[12] Elisabetta Carrara,et al. The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Secure Real-time Transport Protocol (SRTP) , 2006, RFC.
[13] Ram Dantu,et al. Detecting Spam in VoIP Networks , 2005, SRUTI.
[14] R. MacIntosh,et al. Detection and mitigation of spam in IP telephony networks using signaling protocol analysis , 2005, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005..
[15] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[16] Y. Rebahi,et al. SIP Service Providers and The Spam Problem , 2005 .
[17] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[18] B. Goode,et al. Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.
[19] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002, IEEE Netw..
[20] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[21] M. C. Revett,et al. Network computing , 1997 .
[22] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[23] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[24] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[25] A.E. Klietz,et al. Network supercomputing , 1992, IEEE Network.
[26] R. Dantu,et al. Detecting Phishing in Emails , .