-
1
-
-
84871604173
-
Security Concerns With VoIP
-
August 20, Defenses and Countermeasures, Core Competence, Inc
-
E. Weiss, "Security concerns with VoIP" August 20, 2001, IP Telephony (VOIP) Threats, Defenses and Countermeasures, Core Competence, Inc., http://www.sans.org/rr/papers/index.php?id=323
-
(2001)
-
-
Weiss, E.1
-
2
-
-
33750050331
-
-
Wiley
-
M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, Security Patterns: Integrating security and systems engineering, Wiley 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.B.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
3
-
-
70349154336
-
-
Master's thesis, Florida Atlantic University, August
-
J. C. Pelaez. Security in VoIP networks. Master's thesis, Florida Atlantic University, August 2004.
-
(2004)
Security In VoIP Networks
-
-
Pelaez, J.C.1
-
4
-
-
33751052258
-
Multiple Design Patterns for Voice over IP (VoIP) Security
-
Phoenix, AZ, April
-
Z. Anwar, W. Yurcik, R. Johnson, M. Hafiz and R. Campbell. "Multiple Design Patterns for Voice over IP (VoIP) Security", in Proceedings of the IEEE Workshop on Information Assurance (WIA 206), Phoenix, AZ, April 2006.
-
(2006)
Proceedings of the IEEE Workshop On Information Assurance (WIA 206)
-
-
Anwar, Z.1
Yurcik, W.2
Johnson, R.3
Hafiz, M.4
Campbell, R.5
-
5
-
-
70349087880
-
Security analysis and experiments for Voice over IP RTP media streams
-
Sao Jose dos Campos, Sao Paolo, Brazil, November 8-10
-
C. Wieser, J. Roning and A. Takanen, "Security analysis and experiments for Voice over IP RTP media streams", Proceedings of the 8th International Symposium on System and Information Security (SSI'2006), Sao Jose dos Campos, Sao Paolo, Brazil, 8-10 November 2006.
-
(2006)
Proceedings of the 8th International Symposium On System and Information Security (SSI'2006)
-
-
Wieser, C.1
Roning, J.2
Takanen, A.3
-
7
-
-
77958060597
-
Including VoIP over WLAN in a Seamless Next-Generation Wireless Environment
-
Whitepapers, Texas Instruments, March 8,
-
Bastermagian N., "Including VoIP over WLAN in a Seamless Next-Generation Wireless Environment", Whitepapers, Texas Instruments, March 8, 2004. International Engineering Consortium. http://www.iec.org/online/tutorials/ti_voip_wlan/
-
(2004)
International Engineering Consortium
-
-
Bastermagian, N.1
-
8
-
-
33845264120
-
Defining Security Requirements through Misuse Actions
-
S. F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing, Springer
-
E. B. Fernandez, M. VanHilst, M. M. Larrondo Petrie, S. Huang, Defining Security Requirements through Misuse Actions, in Advanced Software Engineering: Expanding the Frontiers of Software Technology, S. F. Ochoa and G.-C. Roman (Eds.), International Federation for Information Processing, Springer, 2006, 123-137.
-
(2006)
Advanced Software Engineering: Expanding the Frontiers of Software Technology
, pp. 123-137
-
-
Fernandez, E.B.1
Vanhilst, M.2
Larrondo, P.M.M.3
Huang, S.4
-
10
-
-
84871537490
-
-
Siemens Whitepaper
-
Pogar Joel, "Data Security in a Converged Network", Siemens Whitepaper, 2003, http://whitepapers.techrepublic.com.com/whitepaper.aspx?docid=57980
-
(2003)
Data Security In a Converged Network
-
-
Joel, P.1
-
11
-
-
2042437729
-
Securing The IP Telephony Perimeter
-
April 5
-
D. Greenfield, "Securing The IP Telephony Perimeter", Network Magazine, April 5, 2004. http://www.networkmagazine.com/shared/article/showArticle.jhtml?articleId=18900070
-
(2004)
Network Magazine
-
-
Greenfield, D.1
-
12
-
-
84871599933
-
Security requirements and Constraints of VoIP
-
Helsinki University of Technology, September 17
-
M. Marjalaakso, "Security requirements and Constraints of VoIP", Department of Electrical Engineering and Communications, Helsinki University of Technology, September 17 2001, http://www.hut.fi/-mmarjala/voip
-
(2001)
Department of Electrical Engineering and Communications
-
-
Marjalaakso, M.1
-
13
-
-
36448967526
-
Attack patterns: A new forensic and design tool
-
Orlando, Florida, USA, January 29-31
-
E. B. Fernandez, J. C. Pelaez, and M. M. Larrondo-Petrie, Attack patterns: A new forensic and design tool, in Proceedings of the Third Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 29-31, 2007.
-
(2007)
Proceedings of the Third Annual IFIP WG 11.9 International Conference On Digital Forensics
-
-
Fernandez, E.B.1
Pelaez, J.C.2
Larrondo-Petrie, M.M.3
-
17
-
-
20844455974
-
Challenges in security Voice over IP
-
May/June
-
T.J. Walsh and D.R. Kuhn, "Challenges in security Voice over IP", IEEE Security and Privacy, vol. 3 no. 3, May/June 2005, 44-49.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 44-49
-
-
Walsh, T.J.1
Kuhn, D.R.2
|