메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 65-68

Towards a security policy for VOIP applications

Author keywords

VoIP attacks; VoIP security

Indexed keywords

CONFIDENTIALITY; SECURITY POLICY; VOIP ATTACKS; VOIP SECURITY;

EID: 33751323009     PISSN: 08407789     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCECE.2005.1556878     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 2
    • 84860034654 scopus 로고    scopus 로고
    • The new security risk of VoIP
    • October 2
    • L. Hensell, "The new security risk of VoIP," E-Commerce Times, October 2, 2003, online article: http://www.ecommercetimes.com/story/31731.html.
    • (2003) E-commerce Times
    • Hensell, L.1
  • 3
    • 84860023971 scopus 로고    scopus 로고
    • Microsoft ignoring the biggest source of security threats?
    • February 25
    • P.H. Gregory, "Microsoft ignoring the biggest source of security threats?," Computerworld, February 25, 2004, online: http://www. oomputerworld.com/securitytopics/security/story/0,10801,90466,00.html?SKC= security-90466.
    • (2004) Computerworld
    • Gregory, P.H.1
  • 6
    • 84860034062 scopus 로고    scopus 로고
    • Internet Engineering Task Force (IETF). Online: http://www.ietf.org.
  • 8
    • 84860022005 scopus 로고    scopus 로고
    • Cabir worm wriggles into U.S. mobile phones
    • February 22
    • J. Blau, "Cabir worm wriggles into U.S. mobile phones," PC World, February 22, 2005, online: http://www.pcworld.com/news/article/0,aid,1 197 63,00.asp.
    • (2005) PC World
    • Blau, J.1
  • 11
    • 84860026297 scopus 로고    scopus 로고
    • The session initiation protocol (SIP) and spam
    • February 13
    • J. Rosenberg, C. Jennings, and J. Peterson, "The session initiation protocol (SIP) and spam," Internet Draft, February 13, 2005, online: http://www.jdrosen.net/papers/draft-ietf-sipping-spam-00.txt.
    • (2005) Internet Draft
    • Rosenberg, J.1    Jennings, C.2    Peterson, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.