Kuhn et al., 2005
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Kuhn et al. | Security considerations for voice over IP systems | |
| Keromytis | A comprehensive survey of voice over IP security research | |
| Geneiatakis et al. | Survey of security vulnerabilities in session initiation protocol | |
| Dantu et al. | Issues and challenges in securing VoIP | |
| Park | Voice over IP security | |
| Dwivedi | Hacking VoIP: protocols, attacks, and countermeasures | |
| Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
| Sadiwala | Analysis of security threats of VoIP systems | |
| Asraf et al. | An investigation into the effect of security on performance in a VoIP network | |
| Ackermann et al. | Vulnerabilities and Security Limitations of current IP Telephony Systems | |
| Kuhn et al. | SP 800-58. Security Considerations for Voice Over IP Systems | |
| Arafat et al. | SIP security in IP telephony | |
| Jahanirad et al. | Security measures for VoIP application: A state of the art review | |
| Clayton | Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost | |
| Yeun et al. | Practical implementations for securing voip enabled mobile devices | |
| Omari et al. | A closer look on challenges and security risks of Voice over Internet Protocol infrastructures | |
| Singhai et al. | VoIP Security | |
| Magnusson | SIP trunking benefits and best practices | |
| Moon et al. | Securing VoIP networks via signaling protocol layer | |
| Pelaez | Security in voice over IP networks | |
| Brown | End-to-end security in active networks | |
| Gao | Security in VoIP-Current situation and necessary development | |
| Ylli et al. | EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO | |
| Mahmood | SIP security threats and countermeasures | |
| Rossebo et al. | Security issues in VoIP |