-
2
-
-
84860034654
-
The new security risk of VoIP
-
October 2
-
L. Hensell, "The new security risk of VoIP," E-Commerce Times, October 2, 2003, online article: http://www.ecommercetimes.com/story/31731.html.
-
(2003)
E-commerce Times
-
-
Hensell, L.1
-
3
-
-
84860023971
-
Microsoft ignoring the biggest source of security threats?
-
February 25
-
P.H. Gregory, "Microsoft ignoring the biggest source of security threats?," Computerworld, February 25, 2004, online: http://www. oomputerworld.com/securitytopics/security/story/0,10801,90466,00.html?SKC= security-90466.
-
(2004)
Computerworld
-
-
Gregory, P.H.1
-
4
-
-
84964853055
-
Access control: Policies, models, mechanisms
-
P. Samarati and S. Vimercati, "Access Control: Policies, models, mechanisms," Lecture Notes in Computer Science, vol. 2171, no. 137, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, Issue.137
-
-
Samarati, P.1
Vimercati, S.2
-
5
-
-
33646927326
-
Security considerations for voice over IP systems
-
Special Publication 800-58, Technology Administration, U.S. Department of Commerce
-
D.R. Kuhn, T.J. Walsh, and S. Fries, "Security Considerations for Voice Over IP Systems," Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800-58, Technology Administration, U.S. Department of Commerce, 2004.
-
(2004)
Recommendations of the National Institute of Standards and Technology (NIST)
-
-
Kuhn, D.R.1
Walsh, T.J.2
Fries, S.3
-
6
-
-
84860034062
-
-
Internet Engineering Task Force (IETF). Online: http://www.ietf.org.
-
-
-
-
8
-
-
84860022005
-
Cabir worm wriggles into U.S. mobile phones
-
February 22
-
J. Blau, "Cabir worm wriggles into U.S. mobile phones," PC World, February 22, 2005, online: http://www.pcworld.com/news/article/0,aid,1 197 63,00.asp.
-
(2005)
PC World
-
-
Blau, J.1
-
11
-
-
84860026297
-
The session initiation protocol (SIP) and spam
-
February 13
-
J. Rosenberg, C. Jennings, and J. Peterson, "The session initiation protocol (SIP) and spam," Internet Draft, February 13, 2005, online: http://www.jdrosen.net/papers/draft-ietf-sipping-spam-00.txt.
-
(2005)
Internet Draft
-
-
Rosenberg, J.1
Jennings, C.2
Peterson, J.3
-
12
-
-
0024889726
-
Analysis and simulation of a fair queuing algorithm
-
Austin, USA, September 19-22
-
A. Demers, S. Keshav, and S. Shenker, "Analysis and simulation of a fair queuing algorithm," Proc. Special Interest Group on Data Communication (SIGCOMM), Austin, USA, September 19-22 1989.
-
(1989)
Proc. Special Interest Group on Data Communication (SIGCOMM)
-
-
Demers, A.1
Keshav, S.2
Shenker, S.3
-
13
-
-
4544272175
-
Controlling high-bandwidth aggregates in the network
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson, and S. Shenker, "Controlling high-bandwidth aggregates in the network," A CM SIGCOMM Computer Communication Review, vol. 32, no. 3, pp. 62-73, 2002.
-
(2002)
A CM SIGCOMM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
|