1. Ahamad, M., Amster, D., Barrett, M., Cross, T., Heron, G., Jackson, D., King, J., Lee, W., Naraine, R., Ollmann, G., Ramsey, J., Schmidt, H. A., Traynor, P. (2008): Emerging cyber threats report for 2009. Technical report, Georgia Tech Information Security Center
2. Berger, A., Hefeeda, M. (2009): Exploiting SIP for botnet communication. In: Proc. of the 5th Workshop on Secure Network Protocols, Princeton, NJ
3. Berger, A., Gojmerac, I., Jung, O. (2009): Internet security meets the IP multimedia subsystem: an overview. Security and Communications Networks
4. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J. (2003): Diameter Base Protocol. RFC 3588
5. Darilion, K. (2008): Analysis of a VoIP Attack