P. Thermos and A. Takanen, Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures, 2007.

D. R. Kuhn, T. J. Walsh, and S. Fries, Security Considerations for Voice Over IP Systems. National Institute of Standards and Technology, 2005.

D. Shin and C. Shim, Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm, IEEE Network Magazine, vol.20, 2006.

M. Bunini and S. Sicari, Assessing the risk of intercepting VoIP calls, Computer Networks, vol.52, issue.12, 2008.
DOI : 10.1016/j.comnet.2008.05.001

T. Bedford and R. Cooke, Probabilistic Risk Analysis: Foundations and Methods, 2001.
DOI : 10.1017/CBO9780511813597

D. 'heureuse, N. Seedorf, J. Niccolini, S. Ewald, and T. , Protecting SIP-based Networks and Services from Unwanted Communications, Proc. of IEEE/Global Telecommunications Conference (GLOBECOM'08, 2008.

A. Gehani and G. Kedem, RheoStat: Real-Time Risk Management, Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection, 2004.
DOI : 10.1007/978-3-540-30143-1_16

O. Dabbebi, R. Badonnel, and O. Festor, Automated runtime risk management for voice over IP networks and services, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, 2010.
DOI : 10.1109/NOMS.2010.5488435

URL : https://hal.archives-ouvertes.fr/inria-00538675