Академический Документы
Профессиональный Документы
Культура Документы
anti-SPIT architecture
1
2
3
4
5
attacks
6
7
8
Defence
9
Denial of Services
10
11
12
13
14
15
16
17
18
Service Abuse
19
20
General overview
21
22
P2P SIP
23
Field Study and System / Protocol Analysis
24
25
performance analysis
26
27
28
29
30
authentication protocols
31
32
33
34
35
36
37
38
39
40
41
42
architecture
43
44
45
46
47
48
49
50
51
52
53
54
55
middlebox
56
Judul Paper
anti-SPIT architecture
A distributed cooperative detection scheme for SPIT attacks in SIP based systems
A first look on the effects and mitigation of VoIP SPIT flooding in 4G mobile networks
A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
A SPIT detection algorithm based on user-s call behavior
Automated Intrusion Detection and Prevention System over SPIT -AIDPoS-
2012
2012
2012
2013
2015
2012
2015
2015
2012
2012
2013
2013
2013
2014
2016
2016
2016
2016
2012
2014
2012
2013
2012
2013
2014
2012
2013
2013
2013
2015
2012
2012
2012
2012
2013
2013
2014
2014
2015
2015
2015
2016
2012
2012
2012
2013
2013
2014
2014
2014
2014
2014
2016
2016
2016
2014
Key Point
detection on spam over internet telephony using distribution cooperative detecting method to reduce attack detection duratio
DOS effect of VOIP SPIT Flooding on 4G Network. And proposing distributed architecture on the mobile network infrastructure
prevention system on SIP that adopt rule-based approach for prevention specification on SIP protocol to stop attack, using dete
Spam over IP Telephony detection alghoritm
intrusion detection and prevention over SPIT
survey about how much SIP security enforced when attacks occurred
DOS attack detection using tanimoto distance and modified moving average mechanism
simple and robust detection system for flooding attack through transition state (DOS)
A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP
using block the stream to detection and prevention DOS attack
VOIP flooding attacks detection and prevention
DOS detection on SIP using delayed-mechanism
DOS attack detection using fuzzy logic and FSM (finite state machine)
An Empirical Study of Denial of Service -DoS- against VoIP
An empirical study of security of VoIP system
analyzing communication record to prevent VOIP attack, specially on total fraud attack
detecting and preventing VoIP fraud and misuse using SHUNSHINE
identify and describes security issue on SIP that may lead DoS
examine 10 mobile VoIP application and capture security performance
MIKEY protocol and Diffe-Hellman algorithm for key establishment in ZRTP on P2P communication
SDES on TLS over SIP protocol
secure identity-based mechanism for enhancing SIP security
overview about authentication threat on PSTN-VOIP architecture
enhance security on VoIP using hardware security feature
evaluation on voip encryption performance and authentication method over firewall performance
identity based cryptography on SIP authentication
survey on authentication on key agreement scheme for SIP protocol
key-less cryptography to increase performance due to use elliptical curve cryptography
SIP authentication using ECC and ticket server
TLS handshake using ECDH for local SIP environment
proposed biometric authentication on network conversation