Author:
Gritzalis Dimitris,Katsaros Panagiotis,Basagiannis Stylianos,Soupionis Yannis
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference42 articles.
1. Walsh T., Kuhn D.: Challenges in securing voice over IP. IEEE Secur. Priv. 3(3), 44–49 (2005)
2. Sawda, S., Urien, O.: SIP security attacks and solutions: a state-of-the-art review. In: Proceedings of the IEEE International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA ’06), vol. 2, pp. 3187–3191 (2006)
3. Rosenberg, J., Jennings, C.: The session initiation protocol and spam. Network Working Group, RFC 5039 (2008)
4. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: Session Initiation Protocol (SIP), RFC 3261 (2002)
5. Marias, G., Dritsas, S., Theoharidou, M., Mallios, Y., Gritzalis, D.: SIP vulnerabilities and antiSPIT mechanisms assessment. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks (ICCCN 2007), USA, pp. 597–604 (2007)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献