-
1
-
-
84905240565
-
SIP security mechanisms: A state-of-the-art review
-
Samos, Greece
-
D. Geneiatakis, G. Kambourakis, T. Dagiuklas, C. Lambrinoudakis, and S. Gritzalis, "SIP security mechanisms: A state-of-the-art review," in Proceedings of the Fifth International Network Conference (INC 2005), Samos, Greece, 2005, pp. 147-155.
-
(2005)
Proceedings of the Fifth International Network Conference (INC 2005)
, pp. 147-155
-
-
Geneiatakis, D.1
Kambourakis, G.2
Dagiuklas, T.3
Lambrinoudakis, C.4
Gritzalis, S.5
-
2
-
-
34147137250
-
-
D. Sisalem, S. Ehlert, D. Geneiatakis, G. Kambourakis, T. Dagiuklas, Jiří, M. Rokos, O. Botron, J. Rodriguez, and J. Liu, "Towards a secure and reliable VoIP infrastructure," http://www.snocer.org/Paper/ COOP-005892-SNOCER-D2-1.pdf.
-
Towards a secure and reliable VoIP infrastructure
-
-
Sisalem, D.1
Ehlert, S.2
Geneiatakis, D.3
Kambourakis, G.4
Dagiuklas, T.5
Jiří6
Rokos, M.7
Botron, O.8
Rodriguez, J.9
Liu, J.10
-
3
-
-
34250765571
-
End-to-end network reliability modeling of enterprise VoIP services
-
Vancouver, Canada, April
-
A. Conway and B. Khasnabish, "End-to-end network reliability modeling of enterprise VoIP services," in Proceedings of 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006), Vancouver, Canada, April 2006, pp. 404-413.
-
(2006)
Proceedings of 10th IEEE/IFIP Network Operations and Management Symposium (NOMS 2006)
, pp. 404-413
-
-
Conway, A.1
Khasnabish, B.2
-
4
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, 2007.
-
(2007)
ACM Comput. Surv
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
5
-
-
0037984544
-
-
RFC 3261, the Internet Engineering Task Force IETF
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, M. H. R. Spark, and E. Schooler, "Session initiation protocol," RFC 3261, the Internet Engineering Task Force (IETF), 2002.
-
(2002)
Session initiation protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Spark, M.H.R.6
Schooler, E.7
-
8
-
-
51849088172
-
-
Open source SIP stack
-
"Open source SIP stack: PJSIP library," http://www.pjsip.org.
-
PJSIP library
-
-
-
9
-
-
34447639167
-
-
"Ubuntu linux," http://www.ubuntu.com.
-
Ubuntu linux
-
-
-
11
-
-
51849099928
-
-
"MySQL," http://www.mysql.com.
-
-
-
-
12
-
-
51849118820
-
-
RFC 1321, the Internet Engineering Task Force IETF
-
R. Rivest, "MD5 hashing scheme," RFC 1321, the Internet Engineering Task Force (IETF), 1992.
-
(1992)
MD5 hashing scheme
-
-
Rivest, R.1
-
13
-
-
51849124648
-
-
PIKE module
-
"PIKE module," http://www.iptel.org/ser/doc/modules/pike.
-
-
-
-
14
-
-
0038729330
-
Prevention from distributed denial of service attacks using history-based IP filtering
-
Anchorage, Alaska, USA, August
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Prevention from distributed denial of service attacks using history-based IP filtering," in Proceedings of 38th IEEE International Conference on Communications (ICC 2003), Anchorage, Alaska, USA, August 2003, pp. 482-486.
-
(2003)
Proceedings of 38th IEEE International Conference on Communications (ICC 2003)
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
15
-
-
0021426851
-
A note on denial-of-service in operating systems
-
V. D. Gligor, "A note on denial-of-service in operating systems," IEEE Trans. Softw. Eng., vol. 10, no. 3, pp. 320-324, 1984.
-
(1984)
IEEE Trans. Softw. Eng
, vol.10
, Issue.3
, pp. 320-324
-
-
Gligor, V.D.1
-
18
-
-
44949263208
-
-
W. Marshall, A. F. Faryar, K. Kealy, G. de los Reyes, I. Rosencrantz, R. Rosencrantz, and C. Spielman, Carrier VoIP security architecture, in Proceedings of 12th International Telecommunications and Network Strategy and Planning Symposium, NETWORKS 2006, November 2006, pp. 1-6.
-
W. Marshall, A. F. Faryar, K. Kealy, G. de los Reyes, I. Rosencrantz, R. Rosencrantz, and C. Spielman, "Carrier VoIP security architecture," in Proceedings of 12th International Telecommunications and Network Strategy and Planning Symposium, NETWORKS 2006, November 2006, pp. 1-6.
-
-
-
-
19
-
-
33845927657
-
Can I add a secure VoIP call?
-
June
-
A. Nascimento, A. Passito, E. Mota, E. Nascimento, and L. Carvalho, "Can I add a secure VoIP call?" in Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06), June 2006.
-
(2006)
Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06)
-
-
Nascimento, A.1
Passito, A.2
Mota, E.3
Nascimento, E.4
Carvalho, L.5
-
20
-
-
33751059308
-
-
H. Abdelnur, V. Cridlig, R. State, and O. Festor, VoIP security assessment: Methods and tools, in Proceedings of 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, April 2006, pp. 29-34.
-
H. Abdelnur, V. Cridlig, R. State, and O. Festor, "VoIP security assessment: Methods and tools," in Proceedings of 1st IEEE Workshop on VoIP Management and Security, Vancouver, Canada, April 2006, pp. 29-34.
-
-
-
|