V. Bartos, M. Zadnik, and T. Cejka, Nemea: Framework for stream-wise analysis of network traffic, Tech. rep., CESNET, 2013.

B. Claise, Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information, p.7011, 2013.
DOI : 10.17487/rfc7011

F. El-moussa, P. Mudhar, and A. Jones, Overview of SIP Attacks and Countermeasures, Information Security and Digital Forensics, pp.82-91, 2010.
DOI : 10.1109/MNET.2002.1081764

S. Gauci, SIPVicious. Tools for auditing sip based voip systems (2012), https://code.google.com

L. Hellemons, L. Hendriks, R. Hofstede, A. Sperotto, R. Sadre et al., SSHCure: A Flow-Based SSH Intrusion Detection System, Dependable Networks and Services, pp.86-97, 2012.
DOI : 10.1007/978-3-642-30633-4_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.643.997

D. Hoffstadt, A. Marold, and E. Rathgeb, Analysis of SIP-Based Threats Using a VoIP Honeynet System, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp.541-548, 2012.
DOI : 10.1109/TrustCom.2012.90

R. Hofstede, P. Celeda, B. Trammell, I. Drago, R. Sadre et al., Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX, IEEE Communications Surveys & Tutorials, vol.16, issue.4, pp.2037-2064, 2014.
DOI : 10.1109/COMST.2014.2321898

URL : http://doc.utwente.nl/93156/1/tutorial.pdf

A. D. Keromytis, A Comprehensive Survey of Voice over IP Security Research, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.514-537, 2012.
DOI : 10.1109/SURV.2011.031611.00112

P. Velan and P. Celeda, Next Generation Application-Aware Flow Monitoring, Monitoring and Securing Virtualized Networks and Services, pp.173-178, 2014.
DOI : 10.1007/978-3-662-43862-6_20

URL : https://hal.archives-ouvertes.fr/hal-01401303

V. Security, SiVuS (SiP Vulnerability Scanner) ? User Guide v1