메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 19-29

Security patterns for voice over IP networks

Author keywords

Network architecture; Security patterns; Software architecture; Voice over IP

Indexed keywords

INTERNET TELEPHONY; NETWORK ARCHITECTURE; NETWORK SECURITY; SOFTWARE ARCHITECTURE; UNIFIED MODELING LANGUAGE; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 73649140895     PISSN: 1796217X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jsw.2.2.19-29     Document Type: Article
Times cited : (13)

References (17)
  • 1
    • 84871604173 scopus 로고    scopus 로고
    • Security Concerns With VoIP
    • August 20, Defenses and Countermeasures, Core Competence, Inc
    • E. Weiss, "Security concerns with VoIP" August 20, 2001, IP Telephony (VOIP) Threats, Defenses and Countermeasures, Core Competence, Inc., http://www.sans.org/rr/papers/index.php?id=323
    • (2001)
    • Weiss, E.1
  • 3
    • 70349154336 scopus 로고    scopus 로고
    • Master's thesis, Florida Atlantic University, August
    • J. C. Pelaez. Security in VoIP networks. Master's thesis, Florida Atlantic University, August 2004.
    • (2004) Security In VoIP Networks
    • Pelaez, J.C.1
  • 7
    • 77958060597 scopus 로고    scopus 로고
    • Including VoIP over WLAN in a Seamless Next-Generation Wireless Environment
    • Whitepapers, Texas Instruments, March 8,
    • Bastermagian N., "Including VoIP over WLAN in a Seamless Next-Generation Wireless Environment", Whitepapers, Texas Instruments, March 8, 2004. International Engineering Consortium. http://www.iec.org/online/tutorials/ti_voip_wlan/
    • (2004) International Engineering Consortium
    • Bastermagian, N.1
  • 10
    • 84871537490 scopus 로고    scopus 로고
    • Siemens Whitepaper
    • Pogar Joel, "Data Security in a Converged Network", Siemens Whitepaper, 2003, http://whitepapers.techrepublic.com.com/whitepaper.aspx?docid=57980
    • (2003) Data Security In a Converged Network
    • Joel, P.1
  • 11
    • 2042437729 scopus 로고    scopus 로고
    • Securing The IP Telephony Perimeter
    • April 5
    • D. Greenfield, "Securing The IP Telephony Perimeter", Network Magazine, April 5, 2004. http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleId=18900070
    • (2004) Network Magazine
    • Greenfield, D.1
  • 12
    • 84871599933 scopus 로고    scopus 로고
    • Security requirements and Constraints of VoIP
    • Helsinki University of Technology, September 17
    • M. Marjalaakso, "Security requirements and Constraints of VoIP", Department of Electrical Engineering and Communications, Helsinki University of Technology, September 17 2001, http://www.hut.fi/-mmarjala/voip
    • (2001) Department of Electrical Engineering and Communications
    • Marjalaakso, M.1
  • 17
    • 20844455974 scopus 로고    scopus 로고
    • Challenges in security Voice over IP
    • May/June
    • T.J. Walsh and D.R. Kuhn, "Challenges in security Voice over IP", IEEE Security and Privacy, vol. 3 no. 3, May/June 2005, 44-49.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 44-49
    • Walsh, T.J.1    Kuhn, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.