Analysis and simulation of a fair queueing algorithm
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Queue - VoIP
The Demographics of the Do-Not-Call List
IEEE Security and Privacy
Canning Spam: Proposed Solutions to Unwanted Email
IEEE Security and Privacy
Signaling Vulnerabilities in Wiretapping Systems
IEEE Security and Privacy
Security, Wiretapping, and the Internet
IEEE Security and Privacy
Comparative analysis of traditional telephone and voice-over-Internet protocol (VoIP) systems
ISEE '04 Proceedings of the International Symposium on Electronics and the Environment
A network mitigation system against distributed denial of service: a Linux-based prototype
EurolMSA '07 Proceedings of the Third IASTED European Conference on Internet and Multimedia Systems and Applications
Mitigating network denial-of-service through diversity-based traffic management
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
SP 800-58. Security Considerations for Voice Over IP Systems
SP 800-58. Security Considerations for Voice Over IP Systems
Hi-index | 0.00 |
As an IP application, Voice over the Internet Protocol is vulnerable to a number of attacks. Security is an essential consideration for VoIP providers since each component in the VoIP infrastructure can be used as a target, and VoIP has specific security challenges as well. Firstly, this paper discusses general aspects of VoIP. Secondly, the paper addresses these aspects to discuss security issues and concerns of this new technology. Finally, the paper considers some security challenges that VoIP systems are facing.