Phithakkitnukoon et al., 2008 - Google Patents
Voip security—attacks and solutionsPhithakkitnukoon et al., 2008
View PDF- Document ID
- 10576958249205375732
- Author
- Phithakkitnukoon S
- Dantu R
- Baatarjav E
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
Voice over IP (VoIP) technology is being extensively and rapidly deployed. Flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an …
- 230000011664 signaling 0 abstract description 20
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Keromytis | A comprehensive survey of voice over IP security research | |
Geneiatakis et al. | Survey of security vulnerabilities in session initiation protocol | |
US8161540B2 (en) | System and method for unified communications threat management (UCTM) for converged voice, video and multi-media over IP flows | |
Endler et al. | Hacking exposed VoIP: voice over IP security secrets & solutions | |
Dantu et al. | Issues and challenges in securing VoIP | |
US20150040220A1 (en) | System and Method for Unified Communications Threat Management (UCTM) for Converged Voice, Video and Multi-Media Over IP Flows | |
Patrick | Voice over IP security | |
Geneiatakis et al. | A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment | |
Baumann et al. | Voice over IP-security and SPIT | |
Naeem et al. | A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP) | |
Dwivedi | Hacking VoIP: protocols, attacks, and countermeasures | |
Phithakkitnukoon et al. | Voip security—attacks and solutions | |
Wang et al. | Voice pharming attack and the trust of VoIP | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Shan et al. | Research on security mechanisms of SIP-based VoIP system | |
Carvajal et al. | Detecting unprotected SIP-based Voice over IP traffic | |
Duanfeng et al. | Security mechanisms for SIP-based multimedia communication infrastructure | |
Ackermann et al. | Vulnerabilities and Security Limitations of current IP Telephony Systems | |
Feher et al. | The security of WebRTC | |
Zhang et al. | On the billing vulnerabilities of SIP-based VoIP systems | |
Ahmadzadegan et al. | Secure communication and VoIP threats in next generation networks | |
Arafat et al. | SIP security in IP telephony | |
Kim et al. | VoIP secure communication protocol satisfying backward compatibility | |
Baatarjav | Santi Phithakkitnukoon, Ram Dantu, and | |
Ylli et al. | EXPLOITING VOIP SECURITY ISSUES IN A CLASSIC SCENARIO |