Li et al., 2010
| Publication | Publication Date | Title |
|---|---|---|
| Dreger et al. | Dynamic application-layer protocol analysis for network intrusion detection | |
| Ehlert et al. | Survey of network security systems to counter SIP-based denial-of-service attacks | |
| US12184695B2 (en) | Deploying session initiation protocol application network security | |
| US8601585B2 (en) | Modification of messages for analyzing the security of communication protocols and channels | |
| Geneiatakis et al. | A framework for protecting a SIP-based infrastructure against malformed message attacks | |
| US20150381627A1 (en) | Identification of patterns in stateful transactions | |
| US20120297457A1 (en) | Interactive Malware Detector | |
| Geneiatakis et al. | Utilizing bloom filters for detecting flooding attacks against SIP based services | |
| Seo et al. | SIPAD: SIP–VoIP anomaly detection using a stateful rule tree | |
| Niccolini et al. | SIP intrusion detection and prevention: recommendations and prototype implementation | |
| Ehlert et al. | Two layer Denial of Service prevention on SIP VoIP infrastructures | |
| Tsiatsikas et al. | The devil is in the detail: SDP-driven malformed message attacks and mitigation in SIP ecosystems | |
| Azrour et al. | Experimental evaluation of proposed algorithm for identifying abnormal messages in SIP network | |
| Değirmenci et al. | ROSIDS23: Network intrusion detection dataset for robot operating system | |
| Li et al. | A rules-based intrusion detection and prevention framework against SIP malformed messages attacks | |
| Li et al. | An efficient intrusion detection and prevention system against SIP malformed messages attacks | |
| Shrestha | Security of SIP-based infrastructure against malicious message attacks | |
| KR101287588B1 (en) | Security System of the SIP base VoIP service | |
| Wu et al. | Intrusion detection in voice over IP environments | |
| Seo et al. | Detecting more SIP attacks on VoIP services by combining rule matching and state transition models | |
| Geneiatakis et al. | Novel protecting mechanism for SIP-based infrastructure against malformed message attacks: Performance evaluation study | |
| Pokharel et al. | Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication | |
| Ghafarian et al. | An empirical study of security of VoIP system | |
| KR20100073535A (en) | Detection apparatus for attack of malformed sip message and method thereof | |
| Shuang et al. | IMS security analysis using multi-attribute model |