A. Gehani and G. Kedem, RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004.
DOI : 10.1007/978-3-540-30143-1_16

T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, 2001.
DOI : 10.1017/CBO9780511813597

M. Modarres, Risk Analysis in Engineering: Techniques, Trends, and Tools, 2006.

H. Kim, M. J. Kim, Y. Kim, and H. C. Jeong, DEVS-Based modeling of VoIP spam callers??? behavior for SPIT level calculation, Simulation Modelling Practice and Theory, vol.17, issue.4, 2008.
DOI : 10.1016/j.simpat.2008.09.008

G. Stoneburner, A. Goguen, and A. Feringa, Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology, Tech. Rep, 2002.
DOI : 10.6028/NIST.SP.800-30

J. Sauve, R. Santos, R. Reboucas, A. Moura, and C. Bartolini, Change Priority Determination in IT Service Management Based on Risk Exposure, IEEE Transactions on Network and Service Management, vol.5, issue.3, 2008.
DOI : 10.1109/TNSM.2009.031105

A. Keller, J. Hellerstein, J. Wolf, K. Wu, and V. Krishnan, The CHAMPS system: change management with planning and scheduling, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004.
DOI : 10.1109/NOMS.2004.1317679

K. Alsubhi, E. Shaer, and R. Boutaba, Alert prioritization in Intrusion Detection Systems, NOMS 2008, 2008 IEEE Network Operations and Management Symposium, 2008.
DOI : 10.1109/NOMS.2008.4575114

M. Bunini and S. Sicari, Assessing the risk of intercepting VoIP calls, Computer Networks, vol.52, issue.12, 2008.
DOI : 10.1016/j.comnet.2008.05.001

D. Shin and C. Shim, Progressive multi gray-leveling: a voice spam protection algorithm, IEEE Network, vol.20, issue.5, p.18
DOI : 10.1109/MNET.2006.1705879

R. Macintosh and D. Vinokurov, Detection and mitigation of spam in IP telephony networks using signaling protocol analysis, IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, 2005., 2005.
DOI : 10.1109/SARNOF.2005.1426509

J. Peterson and C. Jennings, Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP), IETF Request for Comments 4774, 2008.

P. Kolan and R. Dantu, Socio-technical defense against voice spamming, ACM Transactions on Autonomous and Adaptive Systems, vol.2, issue.1, 2007.
DOI : 10.1145/1216895.1216897

T. Peng, M. Luo, and C. Leckie, CPU-Based DoS Attacks against SIP Servers, Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'08), 2008.

N. Heureuse, J. Seedorf, S. Niccolini, and T. Ewald, Protecting SIP-based Networks and Services from Unwanted Communications, Proc. of IEEE Global Telecommunications Conference, 2008.