1 |
J. Evers, "Security Expert: User Education is Pointless," Oct. 2006. http://news.cnet.com/2100-7350_3-6125213.html
|
2 |
S.T. Chow, C. Gustave, and D. Vinokurov, "Authenticating Displayed Names in Telephony," Bell Lab Techn. J., vol. 14, no. 1, 2009, pp. 267-282.
DOI
|
3 |
"Voice Phishing Victims Retrieve Stolen Money," Yonhap News, Mar. 2012.
|
4 |
J.-H. Chang, "Statistical Model-Based Voice Activity Detection Based on Second-Order Conditional MAP with Soft Decision," ETRI J., vol. 34, no. 2, Apr. 2012, pp. 184-189.
DOI
|
5 |
E.-J. Yoon et al., "A Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks," Comput. Commun., vol. 33, no. 14, Sept. 2010, pp. 1674-1681.
DOI
|
6 |
S. Gorling, "The Myth of User Education," Proc. Virus Bulletin Int. Conf., Oct. 19, 2006.
|
7 |
J.H. Chang and K.H. Lee, "Voice Phishing Detection Technique Based on Minimum Classification Error Method Incorporating Codec Parameters," IET Signal Process J., vol. 4, no. 5, Oct. 2010, pp. 502-509.
DOI
|
8 |
IETF RFC 3261, "SIP: Session Initiation Protocol," June 2002.
|
9 |
H. Dwivedi, "Unconventional VoIP Security Threats," in Hacking VoIP: Protocols, Attacks, and Countermeasures, No Starch Press, 2008.
|
10 |
A. Majumder and J. Caffery Jr. "Power Line Communications," IEEE Potentials, vol. 23, no. 4, Oct. 2004, pp. 4-8.
|
11 |
M. Qadeer and A. Imran, "Asterisk Voice Exchange: An Alternative to Conventional EPBX," Int. Conf. Comput. Electr. Eng., Phuket, Thailand, Dec. 20-22, 2008, pp. 652-656.
|
12 |
R.P. Ejzak, C.K. Florkey, and R.W. Hemmeter, "Network Overload and Congestion: A Comparison of ISUP and SIP," Bell Labs Techn. J., vol. 9, no. 3, 2004, pp. 173-182.
|
13 |
ETSI EN 300 356-1, Integrated Services Digital Network (ISDN); Signaling System No. 7; ISDN User Part (ISUP) Version 2 for the International Interface; Part 1: Basic Services, 1999.
|
14 |
IETF RFC 3398, Integrated Services Digital Network (ISDN) User Part (ISUP) to Session Initiation Protocol (SIP) Mapping, Dec. 2002.
|
15 |
S.E. Griffn and C.C. Rackley, "Vishing," Proc. Annual Conf. Inf. Security Curriculum Develop., 2008, pp. 33-35.
|
16 |
F. Maggi, "Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds," IEEE Int. Conf. Comput. Inf. Technol., Bradford, UK, June 29-July 1, 2010, pp. 824-831.
|
17 |
J. Quittek et al., "On Spam over Internet Telephony (SPIT) Prevention," IEEE Commun. Mag., vol. 46, no. 8, Aug. 2008, pp. 80-86.
|
18 |
3GPP TR 33.937, Study of Mechanisms for Protection against Unsolicited Communication for IMS (PUCI), 2012.
|
19 |
A. Tsakountakis, G. Kambourakis, and S. Gritzalis, "SIPA: Generic and Secure Accounting for SIP," Security Commun. Netw., vol. 5, no. 9, Sept. 2012, pp. 1006-1027.
DOI
|
20 |
3GPP TS 23.014, Support of Dual Tone Multi-frequency (DTMF) Signaling, 2012.
|
21 |
G. Karopoulos, G. Kambourakis, and S. Gritzalis, "PrivaSIP: Adhoc Identity Privacy in SIP," Comput. Standard Interfaces J., vol. 33, no. 3, Mar. 2011, pp. 301-314.
DOI
|
22 |
X. Wang et al., "Voice Pharming Attack and the Trust of VoIP," Proc. Int. Conf. Security Privacy Commun. Netw., no. 24, 2008, pp. 1-11.
|
23 |
M. Nassar et al., "Holistic VoIP Intrusion Detection and Prevention System," Proc. Int. Conf. Principles, Syst. Appl. IP Telecommun., 2007, pp. 1-9.
|
24 |
3GPP TS 23.087, User-to-User Signaling (UUS) Supplementary Service; Stage 2, 2012.
|
25 |
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," Proc. USENIX Conf. Syst. Administration, 1999, pp. 229-238.
|
26 |
W. Lee and S.J. Stolfo, "Data Mining Approaches for Intrusion Detection," Proc. USENIX Security Symp., vol. 7, 1998, p. 6.
|
27 |
IETF RFC 1034, DOMAIN NAMES - Concepts and Facilities, Nov. 1987.
|
28 |
R.A. Kemmerer and G. Vigna "Intrusion Detection: A Brief History and Overview," Comput. Mag., vol. 35, no. 4, Apr. 2002, pp. 27-30.
|
29 |
J. Lennox et al., "Interworking Internet Telephony and Wireless Telecommunications Networks," ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 5, Oct. 2001, pp. 25-36.
|
30 |
3GPP TS 29.002, Mobile Application Part (MAP) Specification, 2011.
|
31 |
ITU-T E.721, Network Grade of Service Parameters and Target Values for Circuit Switched Services in the Evolving ISDN, 1999.
|
32 |
S.A. Ahson and M. Ilyas, "Measurement and Analysis on Quality of Skype VoIP," in VoIP Handbook: Applications, Technologies, Reliability, and Security, CRC Press, Inc., Dec. 2008.
|