Performance evaluation of framework of VoIP/SIP server under virtualization environment along with the most common security threats
暂无分享,去创建一个
[1] Hong Li,et al. Distributed adaptive diverse routing for voice-over-IP in service overlay networks , 2009, IEEE Transactions on Network and Service Management.
[2] Pedro Sousa,et al. Towards automated test and validation of SIP solutions , 2015, Telecommunication Systems.
[3] Andrew Jennings,et al. Relay node selection in large-scale VoIP overlay networks , 2009, 2009 First International Conference on Ubiquitous and Future Networks.
[4] Miroslav Voznak,et al. SIP infrastructure performance testing , 2010, ICT 2010.
[5] Jürgen Quittek,et al. On Spam over Internet Telephony (SPIT) Prevention , 2008, IEEE Communications Magazine.
[6] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[7] Andreas Terzis,et al. An Overlay Architecture for High-Quality VoIP Streams , 2006, IEEE Transactions on Multimedia.
[8] Ge Zhang,et al. Blocking attacks on SIP VoIP proxies caused by external processing , 2010, Telecommun. Syst..
[9] Prashant J. Shenoy,et al. Empirical evaluation of latency-sensitive application performance in the cloud , 2010, MMSys '10.
[10] Yacine Bouzida,et al. A Framework for Detecting Anomalies in VoIP Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[11] Jennifer Rexford,et al. Scalable Network Virtualization in Software-Defined Networks , 2013, IEEE Internet Computing.
[12] Thomas Porter,et al. Chapter 9 – IETF Encryption Solutions for VoIP , 2007 .
[13] Carla Merkle Westphall,et al. Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.
[14] Parameshwaran Krishnan,et al. Using Overlay Networks to Improve VoIP Reliability , 2004, ATVA.
[15] Tal Garfinkel,et al. Virtual machine monitors: current technology and future trends , 2005, Computer.
[16] Angelos D. Keromytis,et al. Voice-over-IP Security: Research and Practice , 2010, IEEE Security & Privacy.
[17] Yeh-Ching Chung,et al. Effectiveness of a replica mechanism to improve availability with Arrangement Graph-Based Overlay , 2014, J. Netw. Comput. Appl..
[18] Richard McDougall,et al. Virtualization performance: perspectives and challenges ahead , 2010, OPSR.
[19] D. Richard Kuhn,et al. Challenges in securing voice over IP , 2005, IEEE Security & Privacy Magazine.
[20] Bo-Chao Cheng,et al. An objective-oriented service model for VoIP overlay networks over DiffServ/MPLS networks , 2007, Comput. Commun..
[21] Andreas Terzis,et al. 1-800-OVERLAYS: using overlay networks to improve VoIP quality , 2005, NOSSDAV '05.
[22] Jan Seedorf. Security challenges for peer-to-peer SIP , 2006, IEEE Network.
[23] Henning Schulzrinne,et al. Issues and challenges in securing VoIP , 2009, Comput. Secur..
[24] Sherali Zeadally,et al. Using Cloud Computing to Implement a Security Overlay Network , 2013, IEEE Security & Privacy.
[25] Yiwei Thomas Hou,et al. Service overlay networks: SLAs, QoS, and bandwidth provisioning , 2003, TNET.
[26] Peter A. Dinda,et al. Palacios and Kitten: New high performance operating systems for scalable virtualized and native supercomputing , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).
[27] Dong Xuan,et al. P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks , 2005, Future Gener. Comput. Syst..
[28] Huzur Saran,et al. Capacity management and routing policies for voice over IP traffic , 2000 .