. Voipsa, VoIP security and privacy threat taxonomy Public Release 1, 2005.

B. Reynolds and D. Ghosal, Secure IP telephony using multi-layered protection, Proceedings of The 10th Annual Network and Distributed System Security Symposium, 2003.

S. Niccolini, R. Garroppo, S. Giordano, G. Risi, and S. Ventura, SIP intrusion detection and prevention: recommendations and prototype implementation, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.47-52, 2006.
DOI : 10.1109/VOIPMS.2006.1638122

Y. Wu, S. Bagchi, S. Garg, N. Singh, and T. K. Tsai, SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments, International Conference on Dependable Systems and Networks, pp.433-442, 2004.

H. Sengar, D. Wijesekera, H. Wang, and S. Jajodia, VoIP Intrusion Detection Through Interacting Protocol State Machines, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.73

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.2311

J. Fiedler, . Kupka, S. Ehlert, T. Magedanz, and D. Sisalem, VoIP defender, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, 2007.
DOI : 10.1145/1326304.1326307

E. Y. Chen, Detecting DoS attacks on SIP systems, 1st IEEE Workshop on VoIP Management and Security, 2006., pp.53-58, 2006.
DOI : 10.1109/VOIPMS.2006.1638123

S. Ehlert, C. Wang, T. Magedanz, and D. Sisalem, Specification-based denial-ofservice detection for SIP Voice-over-IP networks, The Third International Conference on Internet Monitoring and Protection (ICIMP), pp.59-66, 2008.

G. Zhang, S. Ehlert, T. Magedanz, and D. Sisalem, Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.57-66, 2007.
DOI : 10.1145/1326304.1326314

H. Sengar, H. Wang, D. Wijesekera, and S. Jajodia, Detecting VoIP Floods Using the Hellinger Distance, IEEE Transactions on Parallel and Distributed Systems, vol.19, issue.6, pp.794-805, 2008.
DOI : 10.1109/TPDS.2007.70786

H. Kang, Z. Zhang, S. Ranjan, and A. Nucci, SIP-based VoIP traffic behavior profiling and its applications, Proceedings of the 3rd annual ACM workshop on Mining network data , MineNet '07, pp.39-44, 2007.
DOI : 10.1145/1269880.1269891

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID '08), pp.311-330, 2008.
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

M. Nassar, R. State, and O. Festor, The VoIP Bot project. Available to download at http://gforge.inria.fr

M. Nassar, R. State, and O. Festor, VoIP Malware: Attack Tool & Attack Scenarios, 2009 IEEE International Conference on Communications, 2009.
DOI : 10.1109/ICC.2009.5199570

T. D. Dang, B. Sonkoly, and S. Molnar, Fractal analysis and modeling of VoIP traffic, Proceedings of Networks, pp.217-222, 2004.

F. Duffy and R. Mercer, A Study of Network Performance and Customer Behavior During Direct-Distance-Dialing Call Attempts in the U.S.A., Bell System Technical Journal, vol.57, issue.1, pp.1-33, 1978.
DOI : 10.1002/j.1538-7305.1978.tb02072.x