1. Abualhaj, M.M., Al-Tahrawi, M.M. & Al-Zyoud, M. 2021. Contracting VoIP Packet Payload Down to Zero. Cybernetics and Information Technologies, 21(1), pp.137-150. Available at: https://doi.org/10.2478/cait-2021-0010;
2. Ahmad, B., Gilani, S.A., Iqbal, R., Sherazi, H. & Iranmanesh, V. 2015. Deployment of VoIP Communications in B&A Spy Agency: Design and Implementation. International Journal of Computer Networks and Communications Security, 3(11), pp.424-431 [online]. Available at: https://ijcncs.org/published/volume3/issue11/p3_3-11.pdf [Accessed: 20 October 2023];
3. Ali, M.A., Rashid, I. & Khan, A.A. 2013. Selection of VoIP CODECs for Different Networks based on QoS Analysis. International Journal of Computer Applications, 84(5), pp.38-44. Available at: https://doi.org/10.5120/14575-2702;
4. Bhattacharjee, P.K., Koner, C., Bhunia, C.T. & Maulik, U. 2010. Biometric Entity Based Mutual Authentication Technique for 3-G Mobile Communications. International Journal of Computer Theory and Engineering, 2(1), pp.26-30. Available at: https://doi.org/10.7763/IJCTE.2010.V2.111;
5. Fayyaz, Y., Khan, D.M., Fayyaz, F., Qadri, S., Naweed, S. & Fahad, M. 2016. The Evaluation of Voice-over Internet Protocol (VoIP) by means of Trixbox. International Journal of Natural and Engineering Sciences, 10(3), pp.33-41 [online]. Available at: https://www.ijnes.org/index.php/ijnes/article/view/276/249 [Accessed: 20 October 2023];