I. Voice-over and . Security-alliance, VoIP Security and Privacy Threat Taxonomy, 2005.

M. Nassar, R. State, and O. Festor, Monitoring SIP Traffic Using Support Vector Machines, Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection
DOI : 10.1007/978-3-540-87403-4_17

URL : https://hal.archives-ouvertes.fr/inria-00325290

O. Dabbebi, R. Badonnel, and O. Festor, Automated runtime risk management for voice over IP networks and services, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2010.
DOI : 10.1109/NOMS.2010.5488435

URL : https://hal.archives-ouvertes.fr/inria-00538675

A. Gehani and G. Kedem, RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004.
DOI : 10.1007/978-3-540-30143-1_16

V. Vapnik, Statistical Learning Theory, 1998.

P. Laskov, C. Schäfer, and I. Kotenko, Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines, Proceedings of the first Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp.71-82, 2004.
DOI : 10.1515/PIKO.2004.228

P. Laskov, K. Rieck, C. Schäfer, and K. Müller, Visualization of anomaly detection using prediction sensitivity, Sicherheit, 2005.

T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, 2001.
DOI : 10.1017/CBO9780511813597

M. Modarres, Risk Analysis in Engineering: Techniques, Trends, and Tools, Mohammad Modarres, 2006.

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, 2001.
DOI : 10.1145/1961189.1961199

O. Dabbebi, R. Badonnel, and O. Festor, Managing Risks at Runtime in VoIP Networks and Services, Proc. of the Autonomous Infrastructure, Management and Security (AIMS'10, 2010.
DOI : 10.1007/978-3-642-13986-4_11

URL : https://hal.archives-ouvertes.fr/inria-00538685

R. Dantu, P. Kolan, and J. W. Cangussu, Network risk management using attacker profiling, Security and Communication Networks, pp.83-96, 2009.
DOI : 10.1002/sec.58

D. Shin and C. Shim, Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm, IEEE Network Magazine, vol.20, 2006.

M. Bunini and S. Sicari, Assessing the risk of intercepting VoIP calls, Computer Networks, vol.52, issue.12, 2008.
DOI : 10.1016/j.comnet.2008.05.001

R. Schlegel, S. Niccolini, S. Tartarelli, and M. Brunner, ISE03-2: SPam over Internet Telephony (SPIT) Prevention Framework, IEEE Globecom 2006, 2006.
DOI : 10.1109/GLOCOM.2006.192

A. Keller, J. Hellerstein, J. Wolf, K. Wu, and V. Krishnan, The CHAMPS system: change management with planning and scheduling, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004.
DOI : 10.1109/NOMS.2004.1317679

J. Wickboldt, L. Bianchin, R. Lunardi, F. Andreis, R. L. Santos et al., Computer-generated comprehensive risk assessment for IT project management, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2009.
DOI : 10.1109/NOMS.2010.5488498

J. Quittek, S. Niccolini, S. Tartarelli, M. Stiemerling, M. Brunner et al., Detecting SPIT Calls by Checking Human Communication Patterns, 2007 IEEE International Conference on Communications, 2007.
DOI : 10.1109/ICC.2007.329

V. M. Quinten, R. Van-de-meent, and A. Pras, Analysis of Techniques for Protection Against Spam over Internet Telephony, Proc. of 13th Open European Summer School EUNICE 2007, 2007.
DOI : 10.1007/978-3-540-73530-4_9