A survey of VoIP intrusions and intrusion detection systems
暂无分享,去创建一个
[1] R. K. Bhattacharyya. New challenges for telephone companies to secure switching systems , 1991, Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology.
[2] Rolf Oppliger. Security at the Internet Layer , 1998, Computer.
[3] Jonathan Rosenberg. The Real Time Transport Protocol (RTP) Denial of Service (Dos) Attack and its Prevention( , 2003 .
[4] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[5] T. Dierks,et al. The TLS protocol , 1999 .
[6] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002 .
[7] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[8] Paul D. Amer,et al. SCTP in battlefield networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[9] Baugher,et al. The Secure Real-Time Transport Protocol , 2003 .
[10] Mahbub Hassan,et al. Internet telephony: services, technical challenges, and products , 2000, IEEE Commun. Mag..
[11] Cullen Jennings,et al. Example call flows using SIP security mechanisms , 2005 .
[12] Zhongcheng Li,et al. Survey on QoS management of VoIP , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[13] B. Goode,et al. Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.
[14] Christian Huitema,et al. Megaco Protocol Version 1.0 , 2000, RFC.
[15] G. Manimaran,et al. Internet infrastructure security: a taxonomy , 2002, IEEE Netw..
[16] Sami Knuutinen. Session Initiation Protocol Security Considerations , 2003 .
[17] Depei Qian,et al. Multi-agent based intrusion detection architecture , 2001, Proceedings 2001 International Conference on Computer Networks and Mobile Computing.