-
2
-
-
70350456979
-
The Session Initiation Protocol (SIP) and Spam
-
Network Working Group, January
-
Rosenberg, J., Jennings, C.: The Session Initiation Protocol (SIP) and Spam, Network Working Group, RFC 5039 (January 2008)
-
(2008)
RFC
, vol.5039
-
-
Rosenberg, J.1
Jennings, C.2
-
3
-
-
38549161796
-
Detecting SPIT Calls by Checking Human Communication Patterns
-
Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M., Brunner, M., Ewald, T.: Detecting SPIT Calls by Checking Human Communication Patterns. In: Proc. of IEEE International Conference on Communications (ICC 2007), United Kingdom, pp. 1979-1984 (2007)
-
(2007)
Proc. of IEEE International Conference on Communications (ICC 2007), United Kingdom
, pp. 1979-1984
-
-
Quittek, J.1
Niccolini, S.2
Tartarelli, S.3
Stiemerling, M.4
Brunner, M.5
Ewald, T.6
-
4
-
-
52049085901
-
A Sentinel to Screen Phone Calls Technology
-
accessed November 8, 2009
-
Graham-Rowe, D.: A Sentinel to Screen Phone Calls Technology. MIT Review (2006) (accessed November 8, 2009)
-
(2006)
MIT Review
-
-
Graham-Rowe, D.1
-
5
-
-
57049086456
-
An adaptive policy-based approach to SPIT management
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Soupionis, Y., Dritsas, S., Gritzalis, D.: An adaptive policy-based approach to SPIT management. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 446-460. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 446-460
-
-
Soupionis, Y.1
Dritsas, S.2
Gritzalis, D.3
-
8
-
-
38349029320
-
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
-
Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. Springer, Heidelberg
-
Basagiannis, S., Katsaros, P., Pombortsis, A.: Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 238-251. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4680
, pp. 238-251
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
-
11
-
-
0036506787
-
Security and management policy specification
-
Sloman, M., Lupu, E.: Security and management policy specification. IEEE Network, Special Issue on Policy-Based Networking 16(2), 10-19 (2002)
-
(2002)
IEEE Network, Special Issue on Policy-Based Networking
, vol.16
, Issue.2
, pp. 10-19
-
-
Sloman, M.1
Lupu, E.2
-
13
-
-
13344283515
-
Session Initiation Protocol (SIP)
-
June
-
Rosenberg, J., et al.: Session Initiation Protocol (SIP), RFC 3261 (June 2002)
-
(2002)
RFC
, vol.3261
-
-
Rosenberg, J.1
-
15
-
-
84857413563
-
-
Cisco Systems, SIP Messages and Methods Overview, http://www.cisco.com/ univercd/cc/td/doc/product/software/ios122/rel-docs/sip-flo/preface.pdf
-
SIP Messages and Methods Overview
-
-
-
16
-
-
84857434662
-
-
version 2.0, retrieved March 20, 2009
-
SER server version 2.0, http://www.iptel.org/ser (retrieved March 20, 2009)
-
SER Server
-
-
-
18
-
-
81255207137
-
-
retrieved August 25
-
Twinkle softphone, http://www.twinklephone.com (retrieved August 25)
-
Twinkle Softphone
-
-
-
20
-
-
57349088245
-
Understanding SIP through model-checking
-
Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. Springer, Heidelberg
-
Zave, P.: Understanding SIP through model-checking. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol. 5310, pp. 256-279. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5310
, pp. 256-279
-
-
Zave, P.1
-
22
-
-
71049188601
-
Verification of Policy-based Self-Managed Cell Interactions Using Alloy
-
Schaeffer-Filho, A., Lupu, E., Sloman, M., Eisenbach, S.: Verification of Policy-based Self-Managed Cell Interactions Using Alloy. In: Proc. of the 10th IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2009), UK (July 2009)
-
Proc. of the 10th IEEE International Symposium on Policies for Distributed Systems and Networks (Policy 2009), UK (July 2009)
-
-
Schaeffer-Filho, A.1
Lupu, E.2
Sloman, M.3
Eisenbach, S.4
|