Author:
Hamidi Mohamed,Satori Hassan,Zealouk Ouissam,Satori Khalid
Reference23 articles.
1. Asterisk IVR.
http://www.asterisk.org
. Accessed Jan 2015
2. Shah, K., Ghrera, S.P., Thaker, A.: A novel approach for security issues in VoIP networks in virtualization with IVR. arXiv preprint
arXiv:1206.1748
(2012)
3. Anwar, Z., Yurcik, W., Johnson, R.E., Hafiz, M., Campbell, R.H.: Multiple design patterns for voice over IP (VoIP) security. In: 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006, pp. 8-pp (2006, April)
4. Rafique, M.Z., Akbar, M.A., Farooq, M.: Evaluating DoS attacks against SIP-based VoIP systems. In: Global Telecommunications Conference, GLOBECOM 2009, pp. 1–6. IEEE (2009, November)
5. Basu, J., Bepari, M.S., Roy, R., Khan, S.: Real time challenges to handle the telephonic speech recognition system. In: Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012), pp. 395–408. Springer, India (2013)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献