J. Davidson, J. Peters, M. Bhatia, and S. K. Mukherjee, Voice over IP Fundamentals, 2007.

D. Bryan, B. Lowekamp, and C. Jennings, dSIP: A P2P Approach to SIP Registration, IETF Internet Draft, 2007.

D. Bryan, P. Matthews, E. Shim, D. Willis, and S. Dawkins, Concepts and Terminology for Peer to Peer SIP, IETF Internet Draft, 2010.
DOI : 10.17487/RFC7890

C. Jennings, E. Rescorla, S. Baset, and H. Schulzrinne, REsource LOcation And Discovery (RELOAD), IETF Internet Draft, 2011.

Y. Mao and A. Swaminathan, Threat Analysis for Peer-to-Peer Networks, IETF Internet Draft, 2009.

J. Seedorf, Security challenges for peer-to-peer SIP, IEEE Network, vol.20, issue.5, pp.38-45, 2006.
DOI : 10.1109/MNET.2006.1705882

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006.
DOI : 10.1109/GLOCOM.2006.192

O. Dabbebi, R. Badonnel, and O. Festor, A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011.
DOI : 10.1109/INM.2011.5990549

URL : https://hal.archives-ouvertes.fr/hal-00580317

S. Becker, H. J. Abdelnur, J. L. Obes, R. State, and O. Festor, Improving Fuzz Testing Using Game Theory, 2010 Fourth International Conference on Network and System Security, 2010.
DOI : 10.1109/NSS.2010.81

URL : https://hal.archives-ouvertes.fr/inria-00546174

V. M. Quinten, R. Van-de-meent, and A. Pras, Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of the EUNICE European Summer School, 2007.
DOI : 10.1007/978-3-540-73530-4_9

T. Cholez, I. Chrisment, and O. Festor, Evaluation of Sybil Attacks Protection Schemes in KAD, Proc. of the International Conference on Autonomous Infrastructure, Mgmt and Security, 2009.
DOI : 10.1145/1151659.1159945

URL : https://hal.archives-ouvertes.fr/inria-00405381

C. Miguel, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Secure Routing for Structured Peer-to-Peer Overlay Networks, SIGOPS Operation System Review, vol.36, pp.299-314, 2002.

W. Yang and P. Judge, VISOR: VoIP Security Using Reputation, 2008 IEEE International Conference on Communications, pp.1489-1493, 2008.
DOI : 10.1109/ICC.2008.288

J. Heikkil and A. Gurtov, Filtering SPAM in P2PSIP Communities with Web of Trust, Proc. of the Security and Privacy in Mobile Inf. and Comm. Systems Conference (MobiSec'09), 2009.
DOI : 10.1007/BFb0053741

X. Zheng and V. A. Oleshchuk, Trust-based Framework for Security Enhancement of P2PSIP Communication Systems, Proc. of the 4th International Conference for Internet Technology and Secured Transactions, 2009.

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03
DOI : 10.1145/775152.775242