SIP Vulnerabilities for SPIT, SPIT Identification Criteria, Anti-SPIT Mechanisms Evaluation Framework and Legal Issues
暂无分享,去创建一个
Giannis F. Marias | Lilian Mitrou | Dimitris Gritzalis | Marianthi Theoharidou | Sven Ehlert | J Soupionis | G. Marias | M. Theoharidou | D. Gritzalis | L. Mitrou | S. Ehlert | J. Soupionis
[1] Cullen Jennings,et al. The Session Initiation Protocol (SIP) and Spam , 2008, RFC.
[2] Giannis F. Marias,et al. Threat Analysis of the Session Initiation Protocol Regarding Spam , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[3] Dongwook Shin,et al. Progressive multi gray-leveling: a voice spam protection algorithm , 2006, IEEE Network.
[4] Dorgham Sisalem,et al. Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms , 2006, IEEE Network.
[5] Jeff Hodges,et al. Using SAML to protect the session initiation protocol (SIP) , 2006, IEEE Network.
[6] Jon Peterson,et al. Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) , 2006, RFC.
[7] Voice Over IP-Security and SPIT Swiss Army , FU Br , 2006 .
[8] Ram Dantu,et al. Detecting Spam in VoIP Networks , 2005, SRUTI.
[9] Ursula Sury. Organisatorische und juristische Implikationen bei der datenschutzgerechten Nutzung bzw. Durchführung des Einsatzes von Intrusion Detection , 2005 .
[10] Joachim Posegga,et al. Voice Over IP : Unsafe at any Bandwidth ? , 2005 .
[11] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[12] L. Asscher,et al. Regulating spam: Directive 2002/58 and beyond , 2004 .
[13] Kumar Srivastava,et al. Preventing Spam For SIP-based Instant Messages and Sessions , 2004 .
[14] J.J.C. Kabel. Spam: A Terminal Threat to ISP's , 2003 .
[15] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.