-
1
-
-
55349135046
-
-
Avispa project
-
Avispa project, http://www.avispa-project.org.
-
-
-
-
2
-
-
56549118700
-
-
H. Abdelnur, R. State, and O. Festor. KiF: A state-ful SIP Fuzzer. In Proceedings of Principles, Systems and Applications of IP Telecommunications, IPTComm, pages 47-56, New-York, NY, USA, JUL 2007. ACM Press.
-
H. Abdelnur, R. State, and O. Festor. "KiF: A state-ful SIP Fuzzer". In Proceedings of Principles, Systems and Applications of IP Telecommunications, IPTComm, pages 47-56, New-York, NY, USA, JUL 2007. ACM Press.
-
-
-
-
3
-
-
84881472647
-
-
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lam-brinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem. Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8 (3): 68-81, 3rd. Qtr. 2006.
-
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lam-brinoudakis, S. Gritzalis, K. Ehlert, and D. Sisalem. Survey of security vulnerabilities in session initiation protocol. Communications Surveys & Tutorials, IEEE, 8 (3): 68-81, 3rd. Qtr. 2006.
-
-
-
-
4
-
-
33947149035
-
An ontology description for sip security flaws
-
D. Geneiatakis and C. Lambrinoudakis. An ontology description for sip security flaws. Comput. Commun., 30 (6): 1367-1374, 2007.
-
(2007)
Comput. Commun
, vol.30
, Issue.6
, pp. 1367-1374
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
5
-
-
35048880670
-
Security Analysis of Voice-over-IP Protocols
-
Venice, Italy, JUL, IEEE Computer Society
-
P. Gupta and V. Shmatikov. "Security Analysis of Voice-over-IP Protocols". In 20th IEEE Computer Security Foundations Symposium (CSF), pages 49-63, Venice, Italy, JUL 2007. IEEE Computer Society, 2007.
-
(2007)
20th IEEE Computer Security Foundations Symposium (CSF)
, pp. 49-63
-
-
Gupta, P.1
Shmatikov, V.2
-
6
-
-
55349089079
-
-
Artech House, Inc, Norwood, MA, USA
-
A. B. Johnston and D. M. Piscitello. Understanding Voice over Ip Security (Artech House Telecommunications Library). Artech House, Inc., Norwood, MA, USA, 2006.
-
(2006)
Understanding Voice over Ip Security (Artech House Telecommunications Library)
-
-
Johnston, A.B.1
Piscitello, D.M.2
-
7
-
-
0003559321
-
-
June 2002
-
H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. "SIP: Session Initiation Protocol", http://www.ietf.org/rfc/rfc3261.txt, June 2002.
-
SIP: Session Initiation Protocol
-
-
Schulzrinne, H.1
Camarillo, G.2
Johnston, A.3
Peterson, J.4
Sparks, R.5
Handley, M.6
Schooler, E.7
-
8
-
-
33751033683
-
Securing voip and pstn from integrated signaling network vulnerabilities
-
3 April
-
H. Sengar, R. Dantu, and D. Wijesekera. Securing voip and pstn from integrated signaling network vulnerabilities. VoIP Management and Security, 2006. 1st IEEE Workshop on, pages 1-7, 3 April 2006.
-
(2006)
VoIP Management and Security, 2006. 1st IEEE Workshop on
, pp. 1-7
-
-
Sengar, H.1
Dantu, R.2
Wijesekera, D.3
-
9
-
-
33846887813
-
SS7 over IP: Signaling internetworking vulnerabilities
-
November
-
H. Sengar, R. Dantu, D. Wijesekera, and S. Jajodia. "SS7 over IP: Signaling internetworking vulnerabilities". In IEEE Network, Vol. 20, No. 6, pages 32-41, November 2006.
-
(2006)
IEEE Network
, vol.20
, Issue.6
, pp. 32-41
-
-
Sengar, H.1
Dantu, R.2
Wijesekera, D.3
Jajodia, S.4
-
10
-
-
33750013256
-
Denial of service attacks targeting a sip voip infrastructure: Attack scenarios and prevention mechanisms
-
Sept.-Oct
-
D. Sisalem, J. Kuthan, and S. Ehlert. Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms. Network, IEEE, 20(5):26-31, Sept.-Oct. 2006.
-
(2006)
Network, IEEE
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
12
-
-
38049084740
-
SIP for Mobile Networks and Security Model
-
Shanghai, China, September, IEEE Computer Society
-
H. Wan, G. Su, and H. Ma. "SIP for Mobile Networks and Security Model". In International Conference on Wireless Communications, Networking and Mobile Computing, pages 1809-1812, Shanghai, China, September 2007. IEEE Computer Society, 2007.
-
(2007)
International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 1809-1812
-
-
Wan, H.1
Su, G.2
Ma, H.3
|