Risk analysis on VoIP systems
暂无分享,去创建一个
[1] Marshall Brain,et al. How Stuff Works , 2001 .
[2] Patrick Park. Voice over IP Security , 2008 .
[3] B. Goode,et al. Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.
[4] Jonathan Davidson,et al. Voice over IP Fundamentals , 2000 .
[5] H. Jonathan Chao,et al. Multiprotocol Label Switching , 2002 .
[6] Pedram Hajipour,et al. Comparative Study of M/Er/1 and M/M/1 Queuing Delay Models of the two IP-PBXs , 2010, J. Convergence Inf. Technol..
[7] G. Zorpette,et al. Keeping the phone lines open , 1989, IEEE Spectrum.
[8] Mark Collier,et al. Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions , 2006 .
[9] Petros Mouchtaris,et al. Voice over IP signaling: H.323 and beyond , 2000 .
[10] Haitao Li,et al. Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[11] W.J. Rippon. Threat assessment of IP based voice systems , 2006, 1st IEEE Workshop on VoIP Management and Security, 2006..