1 |
Yacine Rebahi et al., 'Detecting Flooding Attack against IP Multimedia Subsystem(IMS) Network', AICCSA April 2008.
DOI
|
2 |
Akbar, M.A.; Tariq, Z.; Farooq, M. 'A comparative study of anomaly detection algorithms for detection of SIP flooding in IMS', IMSAA 2008, 10-12 Dec. 2008
|
3 |
Hemant Sengar et al., 'Detecting VoIP Floods Using the Hellinger Distance', IEEE Transaction on Parallel and Distributed Systems, vol. 19, no. 6, June 2008.
DOI
ScienceOn
|
4 |
A. Bremler-Barr, R. Halachmi-Bekel, 'Unregister attacks in SIP', NPSEC 2006, Nov. 2006.
|
5 |
V. Siris and F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks," Computer Communications, vol. 29, no. 9, pp. 1433-1442, 2006.
DOI
ScienceOn
|
6 |
Geneiatakis, D et al., 'A lightweight protection mechanism against signaling attacks in a SIPbased VoIP environment', Telecommunication system 1018-4864, Dec. 2007.
DOI
ScienceOn
|
7 |
Fengjiao Wang et al., 'A New Provably Secure Authentication and Key Agreement Mechnism for SIP Using Certificateless Pubilic-Key Cryptography', ICCIS 2007 Dec. 2007.
DOI
|
8 |
J.Rosenberg et al 'SIP : Session Initiation Protocol', RFC 3261, June 2002. system 1018- 4864, Dec. 2007.
|