1. Z. Anwar, W. Yurcik, R. Johnson, M. Hafiz and R. Campbell, Multiple design patterns for VoIP security, Proceedings of the TwentyFifth IEEE Conference on Performance, Computing and Communications, 2006.
2. F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture: A System of Patterns, Volume 1, Wiley, Chichester, United Kingdom, 1996.
3. E. Casey, Investigating sophisticated security breaches, Communications of the ACM, vol. 43(2), 48–54, 2006.
4. CERT Coordination Center, Carnegie Mellon University, Pittsburgh, Pennsylvania (
http://www.cert.org
).
5. M. Collier, The value of VoIP security (
http://www.cconvergence.com/showArticle.jhtml?articleID=22103933
), 2004.