RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004. ,
DOI : 10.1007/978-3-540-30143-1_16
Probabilistic Risk Analysis: Foundations and Methods, 2001. ,
DOI : 10.1017/CBO9780511813597
Risk Analysis in Engineering: Techniques, Trends, and Tools, 2006. ,
DEVS-Based modeling of VoIP spam callers??? behavior for SPIT level calculation, Simulation Modelling Practice and Theory, vol.17, issue.4, 2008. ,
DOI : 10.1016/j.simpat.2008.09.008
Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, Tech. Rep, 2002. ,
DOI : 10.6028/NIST.SP.800-30
Change Priority Determination in IT Service Management Based on Risk Exposure, IEEE Transactions on Network and Service Management, vol.5, issue.3, 2008. ,
DOI : 10.1109/TNSM.2009.031105
The CHAMPS system: change management with planning and scheduling, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004. ,
DOI : 10.1109/NOMS.2004.1317679
Alert prioritization in Intrusion Detection Systems, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, 2008. ,
DOI : 10.1109/NOMS.2008.4575114
Assessing the risk of intercepting VoIP calls, Computer Networks, vol.52, issue.12, 2008. ,
DOI : 10.1016/j.comnet.2008.05.001
Progressive multi gray-leveling: a voice spam protection algorithm, IEEE Network, vol.20, issue.5, p.18 ,
DOI : 10.1109/MNET.2006.1705879
Detection and mitigation of spam in IP telephony networks using signaling protocol analysis, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005., 2005. ,
DOI : 10.1109/SARNOF.2005.1426509
Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), IETF Request for Comments 4774, 2008. ,
Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007. ,
DOI : 10.1145/1216895.1216897
CPU-Based DoS Attacks against SIP Servers, Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'08), 2008. ,
Protecting SIP-based Networks and Services from Unwanted Communications, Proc. of IEEE Global Telecommunications Conference, 2008. ,