-
3
-
-
51849159244
-
CPU-based DoS attacks against SIP servers
-
Ming Luo, Tao Peng, C. Leckie, CPU-based DoS Attacks Against SIP Servers. NOMS, 2008.
-
(2008)
NOMS
-
-
Luo, M.1
Peng, T.2
Leckie, C.3
-
4
-
-
44549085455
-
Denial of service attack and prevention on sip voip insfrastructures using DNS flooding
-
G. Zhang, S. Ehlert, T. Magedanz, D. Sisalem, Denial of service attack and prevention on SIP VoIP Insfrastructures Using DNS Flooding. IPTCOMM, 2007.
-
(2007)
IPTCOMM
-
-
Zhang, G.1
Ehlert, S.2
Magedanz, T.3
Sisalem, D.4
-
5
-
-
33750013256
-
Denial of service attacks targeting a sip voip infrastructure: Attack scenarios and prevention mechanisms
-
September/October
-
D. Sisalem, J. Kuthan, S. Ehlert, Denial of Service Attacks Targeting a SIP VoIP Infrastructure: Attack Scenarios and Prevention Mechanisms. MNET, September/October 2006.
-
(2006)
MNET
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
8
-
-
57349185590
-
VoIP defender: Highly scalable SIP-based security architecture
-
J. Fiedler, T. Kupka, S. Ehlert, T. Magedanz, D. Sisalem, VoIP Defender: Highly Scalable SIP-based Security Architecture. IPTCOMM, 2007.
-
(2007)
IPTCOMM
-
-
Fiedler, J.1
Kupka, T.2
Ehlert, S.3
Magedanz, T.4
Sisalem, D.5
-
9
-
-
70349094763
-
Multiple design patterns for voice over IP security
-
N. A. Chavhan and S. A. Chhabria, Multiple Design Patterns for Voice over IP Security. ICAC3, 2009.
-
(2009)
ICAC3
-
-
Chavhan, N.A.1
Chhabria, S.A.2
-
10
-
-
74949120358
-
Design and implementation of SIP-aware DDoS attack detection system
-
D. Y. Ha et al., Design and Implementation of SIP-aware DDoS Attack Detection System. ICIS, 2009.
-
(2009)
ICIS
-
-
Ha, D.Y.1
-
11
-
-
72749083614
-
Application of evolutionary algorithms in detection of sip based flooding attacks
-
July
-
M. A. Akbar and M. Farooq, Application of Evolutionary Algorithms in Detection of SIP based Flooding Attacks. GECCO, July 2009.
-
(2009)
GECCO
-
-
Akbar, M.A.1
Farooq, M.2
-
12
-
-
70350489420
-
Protecting SIP server from CPU-based DoS attacks using history-based IP filtering
-
C. Zhou, C. Leckie, K. Ramamohanarao, Protecting SIP Server from CPU-Based DoS Attacks using History-Based IP Filtering. LCOMM, 2009.
-
(2009)
LCOMM
-
-
Zhou, C.1
Leckie, C.2
Ramamohanarao, K.3
-
13
-
-
73549084977
-
The simulation for the SIP DDoS attack
-
Chung-Hsin Liu and Chun-Lin Lo, The Simulation for the SIP DDoS Attack. NCM, 2009.
-
(2009)
NCM
-
-
Liu, C.-H.1
Lo, C.-L.2
-
18
-
-
79959861208
-
SIP threats detection system
-
M. Voznak, F. Rezac SIP threats detection system. DNCOCO, 2010.
-
(2010)
DNCOCO
-
-
Voznak, M.1
Rezac, F.2
-
19
-
-
80053043589
-
SIPp-DD: SIP DDoS flood-attack simulation tool
-
J. Stanek, L. Kencl SIPp-DD: SIP DDoS Flood-Attack Simulation Tool. ICCCN, 2011.
-
(2011)
ICCCN
-
-
Stanek, J.1
Kencl, L.2
-
20
-
-
79957440899
-
A framework for SIP intrusion detection and response systems
-
Z. Asgharian et al. A framework for SIP intrusion detection and response systems. CNDS, 2011.
-
(2011)
CNDS
-
-
Asgharian, Z.1
-
21
-
-
80052506309
-
Strategy based proxy to secure user agent from flooding attacks in SIP
-
I. Hussain, F. Nait-Abdesselam Strategy based proxy to secure user agent from flooding attacks in SIP. IWCMC, 2011.
-
(2011)
IWCMC
-
-
Hussain, I.1
Nait-Abdesselam, F.2
|