An ontology description for SIP security flaws
Computer Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
VoIP defender: highly scalable SIP-based security architecture
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Two layer Denial of Service prevention on SIP VoIP infrastructures
Computer Communications
A novel design of a VoIP firewall proxy to mitigate SIP-based flooding attacks
International Journal of Internet Protocol Technology
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A Self-learning System for Detection of Anomalous SIP Messages
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
SecSip: a stateful firewall for SIP-based networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers
Information Security Applications
A SIP security testing framework
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Detecting VoIP-specific denial-of-service using change-point method
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Design and analysis of SIP-based mobile VPN for real-time applications
IEEE Transactions on Wireless Communications
Improving the fixed-line access security for IMS
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A first order logic security verification model for SIP
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy requirements engineering for trustworthy e-government services
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
A call conference room interception attack and its detection
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
DoS attacks exploiting signaling in UMTS and IMS
Computer Communications
Principles, Systems and Applications of IP Telecommunications
A new authenticated key agreement for session initiation protocol
International Journal of Communication Systems
SIPA: generic and secure accounting for SIP
Security and Communication Networks
Journal of Network and Computer Applications
Security and Communication Networks
SIPAD: SIP-VoIP Anomaly Detection using a Stateful Rule Tree
Computer Communications
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Multimedia Tools and Applications
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
Multimedia Tools and Applications
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
Hi-index | 0.00 |
First Page of the Article