H. Abdelnur, V. Cridlig, J. Bourdellon, R. State, and O. Festor, Voip security management, 18th meeting of the Network Management Research Group (NMRG), 2005.

H. Javitz and A. Valdes, The SRI IDES statistical anomaly detector, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp.316-326, 1991.
DOI : 10.1109/RISP.1991.130799

C. Kruegel, G. Vigna, and W. Robertson, A multi-model approach to the detection of web-based attacks, Computer Networks, vol.48, issue.5, pp.717-738, 2005.
DOI : 10.1016/j.comnet.2005.01.009

C. Krügel, T. Toth, and E. Kirda, Service specific anomaly detection for network intrusion detection, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.201-208, 2002.
DOI : 10.1145/508791.508835

J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, 1988.

J. F. Ransome and J. W. Rittinghouse, VoIP security, 2004.

Y. Rebahi and D. Sisalem, Sip service providers and the spam problem, 2ND Workshop on Securing Voice Over IP, 2005.

B. Reynolds and D. Ghosal, Secure ip telephony using multi-layered protection, Proceedings of the Network and Distributed System Security Symposium(NDSS), 2003.

D. Shin and C. Shim, Voice spam control with gray leveling, 2ND Workshop on Securing Voice Over IP, 2005.

P. Thermos and G. Hadsall, Vulnerabilities in SOHO VoIP gateways, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005., 2005.
DOI : 10.1109/SECCMW.2005.1588318

A. Valdes and K. Skinner, Adaptive, Model-Based Monitoring for Cyber Attack Detection, RAID '00: Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp.80-92, 2000.
DOI : 10.1007/3-540-39945-3_6

. Voipsa, Voip security and privacy threat taxonomy Public Realease 1.0, 2005.

Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. K. Tsai, Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004.