Albers et al., 2005 - Google Patents
An analysis of security threats and tools in SIP-based VoIP SystemsAlbers et al., 2005
- Document ID
- 4021997832238172887
- Author
- Albers J
- Hahn B
- McGann S
- Park S
- Zhu R
- Publication year
- Publication venue
- M. Sc. Capstone Paper, Univesity of Colorado, Boulder
External Links
- 238000004458 analytical method 0 title description 25
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | You've got vulnerability: Exploring effective vulnerability notifications | |
Keromytis | A comprehensive survey of voice over IP security research | |
US8176001B2 (en) | System and method for detecting spam over internet telephony (SPIT) in IP telecommunication systems | |
US8161540B2 (en) | System and method for unified communications threat management (UCTM) for converged voice, video and multi-media over IP flows | |
US20150040220A1 (en) | System and Method for Unified Communications Threat Management (UCTM) for Converged Voice, Video and Multi-Media Over IP Flows | |
Tas et al. | A novel SIP based distributed reflection denial-of-service attack and an effective defense mechanism | |
McGann et al. | An analysis of security threats and tools in SIP-based VoIP systems | |
Keromytis | A survey of voice over IP security research | |
Hudaib et al. | DNS advanced attacks and analysis | |
Nuño et al. | A diagnosis and hardening platform for an Asterisk VoIP PBX | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Bella et al. | Multi-service threats: Attacking and protecting network printers and VoIP phones alike | |
Albers et al. | An analysis of security threats and tools in SIP-based VoIP Systems | |
Shrestha | Security of SIP-based infrastructure against malicious message attacks | |
Abdelnur et al. | VoIP security assessment: methods and tools | |
Hoffstadt et al. | Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System | |
Barry et al. | Syntax, and semantics‐based signature database for hybrid intrusion detection systems | |
Arafat et al. | Study on security issue in open source SIP server | |
Rødfoss | Comparison of open source network intrusion detection systems | |
Samant | Automated penetration testing | |
Nassar et al. | VoIP malware: Attack tool & attack scenarios | |
Barry et al. | Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony | |
Berger et al. | Internet security meets the IP multimedia subsystem: an overview | |
Verwoerd et al. | Security architecture testing using IDS—a case study | |
Ehlert | Denial-of-service detection and mitigation for SIP communication networks. |