KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 1989. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
On the security of public key protocols Survey of security vulnerabilities in session initiation protocol, Communications Surveys & Tutorials, vol.29, issue.83, pp.198-20868, 1983. ,
An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, pp.1367-1374, 2007. ,
DOI : 10.1016/j.comcom.2006.12.023
Security Analysis of Voice-over-IP Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.49-63, 2007. ,
DOI : 10.1109/CSF.2007.31
Understanding Voice over Ip Security (Artech House Telecommunications Library), 2006. ,
Session Initiation Protocol (SIP), 2002. ,
DOI : 10.1002/0471219282.eot251
Securing voip and pstn from integrated signaling network vulnerabilities. VoIP Management and Security, pp.1-7, 2006. ,
DOI : 10.1109/voipms.2006.1638116
SS7 over IP: Signaling internetworking vulnerabilities, IEEE Network, pp.32-41, 2006. ,
DOI : 10.1109/mnet.2006.273119
Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms [13] P. Thermos and A. Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures SIP for Mobile Networks and Security Model International Conference on Wireless Communications, Networking and Mobile Computing, pp.26-31, 2006. ,