-
1
-
-
84877619730
-
-
3GPP: TS 23. 228: IP Multimedia Subsystems (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
-
3GPP: TS 23. 228: IP Multimedia Subsystems (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2011).
-
(2011)
-
-
-
3
-
-
33645918247
-
IP spoofing: an introduction
-
Available at:
-
Tanase, M.: IP spoofing: an introduction. Secur. Focus 11 (2003). Available at: http://www. securityfocus. com/infocus/1674.
-
(2003)
Secur. Focus
, vol.11
-
-
Tanase, M.1
-
5
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
Geneiatakis, D., et al.: Survey of security vulnerabilities in session initiation protocol. IEEE Commun. Surv. Tutor. 8, 68-81 (2006).
-
(2006)
IEEE Commun. Surv. Tutor.
, vol.8
, pp. 68-81
-
-
Geneiatakis, D.1
-
6
-
-
50249112555
-
A survey of security threats on 4G networks
-
Washington, DC
-
Park, Y., Park, T.: A survey of security threats on 4G networks. In: IEEE Globecom Workshops, Washington, DC, pp. 1-6 (2007).
-
(2007)
IEEE Globecom Workshops
, pp. 1-6
-
-
Park, Y.1
Park, T.2
-
7
-
-
71549170504
-
A survey of voice over IP security research
-
A. Prakash and I. Sen Gupta (Eds.), Berlin: Springer
-
Keromytis, A.: A survey of voice over IP security research. In: Prakash, A., Sen Gupta, I. (eds.) Information Systems Security, vol. 5905, pp. 1-17. Springer, Berlin (2009).
-
(2009)
Information Systems Security
, vol.5905
, pp. 1-17
-
-
Keromytis, A.1
-
8
-
-
84877616140
-
-
3GPP: TS 33. 203: 3G security; Access security for IP-based services (Release 10). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
-
3GPP: TS 33. 203: 3G security; Access security for IP-based services (Release 10). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2010).
-
(2010)
-
-
-
9
-
-
0003365506
-
RFC 2617: HTTP authentication: basic and digest access authentication
-
Available at:
-
Franks, J., et al.: RFC 2617: HTTP authentication: basic and digest access authentication. Internet Eng. Task Force (1999). Available at: http://www. ietf. org/rfc/rfc2617. txt.
-
(1999)
Internet Eng. Task Force
-
-
Franks, J.1
-
10
-
-
67349141318
-
Intrusion detection in voice over IP environments
-
Wu, Y., et al.: Intrusion detection in voice over IP environments. Int. J. Inf. Secur. 8, 153-172 (2009).
-
(2009)
Int. J. Inf. Secur.
, vol.8
, pp. 153-172
-
-
Wu, Y.1
-
11
-
-
4544342880
-
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
-
Firenze, Italy
-
Wu, Y., et al.: Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments. In: Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), Firenze, Italy, pp. 433-442 (2004).
-
(2004)
Proceedgins of the 2004 International Conference on Dependable Systems and Networks (DSN 2004)
, pp. 433-442
-
-
Wu, Y.1
-
12
-
-
44049088453
-
Detecting VoIP floods using the Hellinger distance
-
Sengar, H., et al.: Detecting VoIP floods using the Hellinger distance. IEEE Trans. Parallel Distrib. Syst. 794-805 (2008).
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, pp. 794-805
-
-
Sengar, H.1
-
13
-
-
70349440967
-
Utilizing bloom filters for detecting flooding attacks against SIP based services
-
Geneiatakis, D., et al.: Utilizing bloom filters for detecting flooding attacks against SIP based services. Compu. Secur. 28, 578-591 (2009).
-
(2009)
Compu. Secur.
, vol.28
, pp. 578-591
-
-
Geneiatakis, D.1
-
14
-
-
77957679003
-
A SIP DoS flooding attack defense mechanism based on priority class queue
-
Beijing, China, 25-27 June
-
Wan, X. Y., et al.: A SIP DoS flooding attack defense mechanism based on priority class queue. In: IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), Beijing, China, 25-27 June, pp. 428-431 (2010).
-
(2010)
IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)
, pp. 428-431
-
-
Wan, X.Y.1
-
17
-
-
79952591077
-
The impact of TLS on SIP server performance
-
Munich
-
Shen, C., et al.: The impact of TLS on SIP server performance. In: IPTComm 2010: 4th Conference on Principles, Systems and Applications of IP Telecommunications Principles, Systems and Applications of IP Telecommunications, Munich, pp. 59-70 (2010).
-
(2010)
IPTComm 2010: 4th Conference on Principles, Systems and Applications of IP Telecommunications Principles, Systems and Applications of IP Telecommunications
, pp. 59-70
-
-
Shen, C.1
-
21
-
-
55349096825
-
Abusing SIP authenticationsISIAS' 08: Fourth International Conference on Information Assurance and Security
-
Abdelnur, H., et al.: Abusing SIP authentication. In: ISIAS' 08: Fourth International Conference on Information Assurance and Security, pp. 237-242 (2008).
-
(2008)
, pp. 237-242
-
-
Abdelnur, H.1
-
23
-
-
84899512720
-
A call conference room interception attack and its detection
-
Privacy and Security in Digital Business, Bilbao, Spain
-
Vrakas, N., et al.: A call conference room interception attack and its detection. In: Presented at the 7th International Conference on Trust, Privacy and Security in Digital Business, Bilbao, Spain, (2010).
-
(2010)
Presented at the 7th International Conference on Trust
-
-
Vrakas, N.1
-
24
-
-
33645694893
-
Man-in-the-middle in tunnelled authentication protocols
-
Asokan, N., et al.: Man-in-the-middle in tunnelled authentication protocols. Lecture Notes in Computer Science, vol. 3364, p. 28 (2005).
-
(2005)
Lecture Notes in Computer Science
, vol.3364
, pp. 28
-
-
Asokan, N.1
-
25
-
-
33846283646
-
Hardening web browsers against man -in-the-middle and eavesdropping attacks
-
Chiba, Japan
-
Xia, H., Brustoloni, J.: Hardening web browsers against man -in-the-middle and eavesdropping attacks. In: Proceedings of the 14th International Conference on World Wide Web, Chiba, Japan, pp. 498-498 (2005).
-
(2005)
Proceedings of the 14th International Conference on World Wide Web
, pp. 498
-
-
Xia, H.1
Brustoloni, J.2
-
26
-
-
77952347156
-
On the feasibility of launching the man -in-the-middle attacks on VoIP from remote attackers
-
Computer and Communications Security, Sydney, Australia, March
-
Zhang, R., et al.: On the feasibility of launching the man -in-the-middle attacks on VoIP from remote attackers. In: Presented at the 4th ACM Symposium on Information, Computer and Communications Security, Sydney, Australia, March (2009).
-
(2009)
Presented at the 4th ACM Symposium on Information
-
-
Zhang, R.1
-
31
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
Bellovin, S.: Security problems in the TCP/IP protocol suite. ACM SIGCOMM Comput. Commun. Rev. 19, 48 (1989).
-
(1989)
ACM SIGCOMM Comput. Commun. Rev.
, vol.19
, pp. 48
-
-
Bellovin, S.1
-
32
-
-
84877614127
-
-
3GPP: TR 33. 978 Security aspects of early IP Multimedia Subsystem (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects
-
3GPP: TR 33. 978 Security aspects of early IP Multimedia Subsystem (IMS). Third Generation Partnership Project, Technical Specification Group Services and System Aspects (2008).
-
(2008)
-
-
-
33
-
-
84877615020
-
-
ETSI: TS 187.003: Telecommunications and internet converged services and protocols for advanced networking (TISPAN): Security Architecture
-
ETSI: TS 187.003: Telecommunications and internet converged services and protocols for advanced networking (TISPAN): Security Architecture. (2008).
-
(2008)
-
-
-
34
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B. H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 422-426 (1970).
-
(1970)
Commun. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
35
-
-
84856753886
-
Statistical segregation method to minimize the false detections during DDoS attacks
-
Udhayan, J., Hamsapriya, T.: Statistical segregation method to minimize the false detections during DDoS attacks. Int. J. Netw. Secur. 13, 152-160 (2011).
-
(2011)
Int. J. Netw. Secur.
, vol.13
, pp. 152-160
-
-
Udhayan, J.1
Hamsapriya, T.2
-
37
-
-
33646023117
-
An introduction to ROC analysis
-
Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27, 861-874 (2006).
-
(2006)
Pattern Recognit. Lett.
, vol.27
, pp. 861-874
-
-
Fawcett, T.1
-
38
-
-
78650118295
-
A whitelist approach to protect SIP servers from flooding attacks
-
Vancouver, BC, 8-10 June
-
Chen, E. Y., Itoh, M.: A whitelist approach to protect SIP servers from flooding attacks. In: IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), Vancouver, BC, 8-10 June, pp. 1-6 (2010).
-
(2010)
IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR)
, pp. 1-6
-
-
Chen, E.Y.1
Itoh, M.2
-
39
-
-
57349164073
-
Holistic VoIP intrusion detection and prevention system
-
In: Bond, G. W., Schulzrinne, H., Sisalem, D. (eds.),New York, USA
-
Nassar, M., Niccolini, S.: Holistic VoIP intrusion detection and prevention system. In: Bond, G. W., Schulzrinne, H., Sisalem, D. (eds.) Principles, Systems andApplications of IP Telecommunications (IPTComm 2007). New York, USA, pp. 1-9 (2007).
-
(2007)
Principles, Systems andApplications of IP Telecommunications (IPTComm 2007)
, pp. 1-9
-
-
Nassar, M.1
Niccolini, S.2
-
42
-
-
80052478378
-
Is ip multimedia subsystem affected by 'malformed message' attacks? an evaluation of openims
-
Seville, Spain, 18-21 July
-
Vrakas, N., et al.: IS IP MULTIMEDIA SUBSYSTEM AFFECTED BY 'MALFORMED MESSAGE' ATTACKS? An Evaluation of OpenIMS. In: SECRYPT 2011, the International Joint Conference on e-Business and Telecommunications, Seville, Spain, 18-21 July (2011).
-
(2011)
SECRYPT 2011, the International Joint Conference on e-Business and Telecommunications
-
-
Vrakas, N.1
|