H. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 1989.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

D. Dolev, A. Yao, D. Geneiatakis, T. Dagiuklas, G. Kambourakis et al., On the security of public key protocols Survey of security vulnerabilities in session initiation protocol, Communications Surveys & Tutorials, vol.29, issue.83, pp.198-20868, 1983.

D. Geneiatakis and C. Lambrinoudakis, An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, pp.1367-1374, 2007.
DOI : 10.1016/j.comcom.2006.12.023

P. Gupta and V. Shmatikov, Security Analysis of Voice-over-IP Protocols, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.49-63, 2007.
DOI : 10.1109/CSF.2007.31

A. B. Johnston and D. M. Piscitello, Understanding Voice over Ip Security (Artech House Telecommunications Library), 2006.

H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks et al., Session Initiation Protocol (SIP), 2002.
DOI : 10.1002/0471219282.eot251

H. Sengar, R. Dantu, and D. Wijesekera, Securing voip and pstn from integrated signaling network vulnerabilities. VoIP Management and Security, pp.1-7, 2006.
DOI : 10.1109/voipms.2006.1638116

H. Sengar, R. Dantu, D. Wijesekera, and S. Jajodia, SS7 over IP: Signaling internetworking vulnerabilities, IEEE Network, pp.32-41, 2006.
DOI : 10.1109/mnet.2006.273119

]. D. Sisalem, J. Kuthan, S. Ehlert, H. Wan, G. Su et al., Denial of service attacks targeting a sip voip infrastructure: attack scenarios and prevention mechanisms [13] P. Thermos and A. Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures SIP for Mobile Networks and Security Model International Conference on Wireless Communications, Networking and Mobile Computing, pp.26-31, 2006.