-
1
-
-
20844455974
-
Challenges in securing voice over IP
-
Walsh, T., Kuhn, D.: Challenges in securing voice over IP. IEEE Secur. Priv. 3(3), 44-49 (2005)
-
(2005)
IEEE Secur. Priv
, vol.3
, Issue.3
, pp. 44-49
-
-
Walsh, T.1
Kuhn, D.2
-
3
-
-
33748764206
-
The session initiation protocol and spam
-
Network Working Group, RFC 5039
-
Rosenberg, J., Jennings, C.: The session initiation protocol and spam. Network Working Group, RFC 5039 (2008)
-
(2008)
-
-
Rosenberg, J.1
Jennings, C.2
-
4
-
-
0037984544
-
-
RFC 3261
-
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley M, Schooler E.: Session Initiation Protocol (SIP), RFC 3261 (2002)
-
(2002)
Session Initiation Protocol (SIP)
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
5
-
-
40949085740
-
SIP vulnerabilities and anti SPIT mechanisms assessment
-
USA
-
Marias, G., Dritsas, S., Theoharidou, M., Mallios, Y., Gritzalis, D.: SIP vulnerabilities and anti SPIT mechanisms assessment. In: Proceedings of the 16th IEEE International Conference on Computer Communications andNetworks (ICCCN 2007), USA, pp. 597-604 (2007)
-
(2007)
Proceedings of the 16th IEEE International Conference On Computer Communications AndNetworks (ICCCN 2007)
, pp. 597-604
-
-
Marias, G.1
Dritsas, S.2
Theoharidou, M.3
Mallios, Y.4
Gritzalis, D.5
-
6
-
-
53049086099
-
A SIP-based SPIT management framework
-
Gritzalis, D., Mallios, Y.: A SIP-based SPIT management framework. Comput. Secur. 27(5-6), 136-153 (2008)
-
(2008)
Comput. Secur
, vol.27
, Issue.5-6
, pp. 136-153
-
-
Gritzalis, D.1
Mallios, Y.2
-
7
-
-
48249108271
-
SPIT identification criteria implementations: Effectiveness and lessons learned
-
In: Samarati, P. (ed.), Springer, Berlin
-
Dritsas, S., Soupionis, Y., Theoharidou, M., Mallios, J., Gritzalis, D. et al.: SPIT identification criteria implementations: effectiveness and lessons learned. In: Samarati, P. (ed.) Proceedings of the 23rd International Information Security Conference (SEC-2008), pp. 381-395. Springer, Berlin (2008)
-
(2008)
Proceedings of the 23rd International Information Security Conference (SEC-2008)
, pp. 381-395
-
-
Dritsas, S.1
Soupionis, Y.2
Theoharidou, M.3
Mallios, J.4
Gritzalis, D.5
-
8
-
-
38549161796
-
Detecting SPIT calls by checking human communication patterns
-
Quittek, J., Niccolini, S., Tartarelli, S., Stiemerling, M., Brunner, M., Ewald, T.: Detecting SPIT calls by checking human communication patterns. In: Proceedings of IEEE International Conference on Communications (ICC'07), pp. 1979-1984 (2007)
-
(2007)
Proceedings of IEEE International Conference On Communications (ICC'07)
, pp. 1979-1984
-
-
Quittek, J.1
Niccolini, S.2
Tartarelli, S.3
Stiemerling, M.4
Brunner, M.5
Ewald, T.6
-
11
-
-
57049086456
-
An adaptive policy-based approach to SPIT management
-
Lopez, J., Jajodia, S. (eds.), Springer, Berlin
-
Soupionis, Y., Dritsas, S., Gritzalis, D.: An adaptive policy-based approach to SPIT management. In: Lopez, J., Jajodia, S. (eds.) Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS 2008), pp. 446-460. Springer, Berlin (2008)
-
(2008)
Proceedings of the 13th European Symposium On Research In Computer Security (ESORICS 2008)
, pp. 446-460
-
-
Soupionis, Y.1
Dritsas, S.2
Gritzalis, D.3
-
12
-
-
84857378001
-
A formally verified mechanism for countering SPIT
-
Xenakis C., Wolthusen S. (eds.), Springer
-
Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D.: A formally verified mechanism for countering SPIT. In: Xenakis C., Wolthusen S. (eds.) Proceedings of the 5th International Conference on Critical Information Infrastructure Security (CRITIS-2010), pp. 128-139, Springer (2010)
-
(2010)
Proceedings of the 5th International Conference On Critical Information Infrastructure Security (CRITIS-2010
, pp. 128-139
-
-
Soupionis, Y.1
Basagiannis, S.2
Katsaros, P.3
Gritzalis, D.4
-
13
-
-
84858276745
-
-
Antispit Policy Schema
-
Antispit Policy Schema (http://users.auth.gr/~basags/sip/AntiSpit_Policy_Schema_1.xsd)
-
-
-
-
14
-
-
33748778764
-
Prevention of Spam over IP Telephony (SPIT)
-
Quittek, J., Niccolini, S., Tarterelli, S., Schlegel, R.: Prevention of Spam over IP Telephony (SPIT). NEC Tech. J. 1(2), 114-119 (2006)
-
(2006)
NEC Tech J
, vol.1
, Issue.2
, pp. 114-119
-
-
Quittek, J.1
Niccolini, S.2
Tarterelli, S.3
Schlegel, R.4
-
15
-
-
11244267295
-
Policy-based validation of san configuration
-
Agrawal, D., Giles, J., Lee, K.-W., Voruganti, K., Filali-Adib, K.: Policy-based validation of san configuration. In: Proceedings of International Workshop on Policies for Distributed Systems and Networks (2004)
-
(2004)
Proceedings of International Workshop on Policies for Distributed Systems and Networks
-
-
Agrawal, D.1
Giles, J.2
Lee, K.-W.3
Voruganti, K.4
Filali-Adib, K.5
-
16
-
-
33744471399
-
Policymanagement for networked systems and applications
-
Agrawal, D., Calo, S., Giles, J., Lee, K.-W. Verma, D.: Policymanagement for networked systems and applications. In: Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management (2005)
-
(2005)
Proceedings of the IFIP/IEEE International Symposium On Integrated Network Management
-
-
Agrawal, D.1
Calo, S.2
Giles, J.3
Lee, K.-W.4
Verma, D.5
-
17
-
-
0000096346
-
An algebraic approach to static analysis of active database rules
-
Baralis, E., Widom, J.: An algebraic approach to static analysis of active database rules. ACM Trans. Database Syst. 25(3), 269-332 (2000)
-
(2000)
ACM Trans. Database Syst
, vol.25
, Issue.3
, pp. 269-332
-
-
Baralis, E.1
Widom, J.2
-
20
-
-
38349029320
-
Intrusion attack tactics for the model checking of e-Commerce security guarantees
-
Springer, Berlin
-
Basagiannis, S., Katsaros, P., Pombortsis, A.: Intrusion attack tactics for the model checking of e-Commerce security guarantees. In: Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP '07), pp. 238-252, Springer, Berlin (2007)
-
(2007)
Proceedings of the 26th International Conference On Computer Safety, Reliability and Security (SAFECOMP '07)
, pp. 238-252
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
-
21
-
-
79251535326
-
Synthesis of attack actions using model checking for the verification of security protocols
-
Basagiannis S., Katsaros, S., Katsaros, P., Pombortsis, A.: Synthesis of attack actions using model checking for the verification of security protocols. Secur. Commun. J. 4(2), 147-161(2011)
-
(2011)
Secur. Commun. J
, vol.4
, Issue.2
, pp. 147-161
-
-
Basagiannis, S.1
Katsaros, S.2
Katsaros, P.3
Pombortsis, A.4
-
22
-
-
35848959071
-
Using CSP to detect errors in the TMN protocol
-
Lowe, G., Roscoe, A.: Using CSP to detect errors in the TMN protocol. IEEE Trans. Softw. Eng. 23(10), 659-669 (1997)
-
(1997)
IEEE Trans. Softw. Eng
, vol.23
, Issue.10
, pp. 659-669
-
-
Lowe, G.1
Roscoe, A.2
-
23
-
-
18944390941
-
The model-checker SPIN
-
Holzmann, G.: The model-checker SPIN. IEEE Trans. Softw. Eng. 23(5), 279-295 (1997)
-
(1997)
IEEE Trans. Softw. Eng
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.1
-
24
-
-
84858276743
-
-
The SPIN model checker website, Accessed 23 May 2011
-
The SPIN model checker website (http://spinroot.com/) (2011). Accessed 23 May 2011
-
(2011)
-
-
-
29
-
-
71049188601
-
Verification of policy-based self-managed cell interactions using alloy
-
Schaeffer-Filho, A., Lupu, E., Sloman, M., Eisenbach, S.: Verification of policy-based self-managed cell interactions using alloy. In: Proceedings of the 10th IEEE International Symposium on Policies for Distributed Systems and Networks (Policy-2009), pp.37-40 (2009)
-
(2009)
Proceedings of the 10th IEEE International Symposium On Policies For Distributed Systems and Networks (Policy-2009)
, pp. 37-40
-
-
Schaeffer-Filho, A.1
Lupu, E.2
Sloman, M.3
Eisenbach, S.4
-
30
-
-
72049110651
-
-
IEEE, IEEE Standard Glossary of Software Engineering Terminology
-
IEEE, IEEE Standard Glossary of Software Engineering Terminology, IEEE Standard 610.12-1990 (1990)
-
(1990)
IEEE Standard
, vol.610
, pp. 12-1990
-
-
-
31
-
-
35248882488
-
A framework and a tool for robustness testing of communicating software
-
Saad-Khorchef, F., Rollet, A., Castanet, R.: A framework and a tool for robustness testing of communicating software. In: Proceedings of the ACM Symposium on Applied Computing (SAC), pp. 1461-1466 (2007)
-
(2007)
Proceedings of the ACM Symposium On Applied Computing (SAC)
, pp. 1461-1466
-
-
Saad-Khorchef, F.1
Rollet, A.2
Castanet, R.3
-
32
-
-
79955766834
-
Aformal approach to robustness testing of network protocol with time constraints
-
Yin, X., Wang, Z., Jing, C., Wu, J.:Aformal approach to robustness testing of network protocol with time constraints. Secur. Commun. Netw. 4(6), 622-632 (2011)
-
(2011)
Secur. Commun. Netw
, vol.4
, Issue.6
, pp. 622-632
-
-
Yin, X.1
Wang, Z.2
Jing, C.3
Wu, J.4
-
33
-
-
77954820677
-
Towards scalable robustness testing
-
Belli, F., Hollmann, A., Eric Wong, W.: Towards scalable robustness testing. In: Proceedings of the 4th International Conference on Secure Software Integration and Reliability Improvement, pp. 208-216 (2010)
-
(2010)
Proceedings of the 4th International Conference on Secure Software Integration and Reliability Improvement
, pp. 208-216
-
-
Belli, F.1
Hollmann, A.2
Eric, W.W.3
-
34
-
-
70549113282
-
Robustness validation in service-oriented architectures
-
LNCS 5835, Springer, Berlin
-
Laranjeiro, N., Vieira, M., Madeira, H.: Robustness validation in service-oriented architectures. In: Architecting Dependable Systems VI, pp. 98-123, LNCS 5835, Springer, Berlin (2009)
-
(2009)
Architecting Dependable Systems VI
, pp. 98-123
-
-
Laranjeiro, N.1
Vieira, M.2
Madeira, H.3
-
35
-
-
84858292441
-
-
Cisco Systems, Session Initiation Protocol gateway call flows and compliance information SIP messages and methods overview, Accessed 07 August 2011
-
Cisco Systems, Session Initiation Protocol gateway call flows and compliance information SIP messages and methods overview(http://www.cisco.com/application/pdf/en/us/guest/products/ps4032/c2001/ccmigration_09186a00800c4bb1.pdf) (2011). Accessed 07 August 2011
-
(2011)
-
-
-
36
-
-
84858288085
-
SIP messages and methods overview
-
Cisco Systems, Accessed 07 August 2011
-
Cisco Systems, "SIP Messages and Methods Overview". (http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/rel_docs/sip_flo/preface.pdf) (2011). Accessed 07 August 2011
-
(2011)
-
-
-
37
-
-
84858292443
-
-
SER Server, ver. 2.0, Retrieved 22 May 2011
-
SER Server, ver. 2.0 (http://www.iptel.org/ser) (2011). Retrieved 22 May 2011
-
(2011)
-
-
-
38
-
-
84858292439
-
-
SIPp traffic generator for the SIP protocol, Accessed 17 August 2010
-
SIPp traffic generator for the SIP protocol (http://sipp.sourceforge.net/) (2010). Accessed 17 August 2010
-
(2010)
-
-
-
39
-
-
84858276742
-
-
The SIP-aSPMv2 Model
-
The SIP-aSPMv2 Model (http://users.auth.gr/~basags/sip/SIPaSPMv2.prom)
-
-
-
-
40
-
-
27244433157
-
Defining fairness
-
Springer, Berlin
-
Völzer, H., Varacca, D., Kindler, E.: Defining fairness. In: Proceedings of 15th International Conference on Concurrency Theory (CONCUR), pp. 458-472, Springer, Berlin (2005)
-
(2005)
Proceedings of 15th International Conference On Concurrency Theory (CONCUR)
, pp. 458-472
-
-
Völzer, H.1
Varacca, D.2
Kindler, E.3
-
41
-
-
0002836659
-
Safety, liveness, and fairness in temporal logic
-
Sistla, A.: Safety, liveness, and fairness in temporal logic. Formal Aspects Comput. 6, 495-511 (1994)
-
(1994)
Formal Aspects Comput
, vol.6
, pp. 495-511
-
-
Sistla, A.1
-
42
-
-
80455144702
-
ASPF: An adaptive anti-SPIT policybased framework
-
Pernul G., et al. (ed.), Austria
-
Soupionis, Y., Gritzalis, D.: ASPF: an adaptive anti-SPIT policybased framework. In: Pernul G., et al. (ed.) Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES-2011), pp. 153-160, Austria (2011)
-
(2011)
Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES-2011)
, pp. 153-160
-
-
Soupionis, Y.1
Gritzalis, D.2
|