Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
Survey of network security systems to counter SIP-based denial-of-service attacks
Session Initiation Protocol is a core protocol for coming real time communication networks,
including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly …
including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly …
Detecting DoS attacks on SIP systems
EY Chen - 1st IEEE Workshop on VoIP Management and …, 2006 - ieeexplore.ieee.org
As VoIP technology becomes more widely deployed due to its economical advantage over
traditional PSTN services, VoIP servers and clients will become attractive targets of denial of …
traditional PSTN services, VoIP servers and clients will become attractive targets of denial of …
A framework for protecting a SIP-based infrastructure against malformed message attacks
This paper presents a framework that can be utilized for the protection of session initiation
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
protocol (SIP)-based infrastructures from malformed message attacks. Its main characteristic …
An ontology description for SIP security flaws
Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as
compared to other protocols like MGCP or H. 323. However, the open SIP architecture …
compared to other protocols like MGCP or H. 323. However, the open SIP architecture …
Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding
A simple yet effective Denial of Service (DoS) attack on SIP servers is to flood the server with
requests addressed at irresolvable domain names. In this paper we evaluate different …
requests addressed at irresolvable domain names. In this paper we evaluate different …
SIPAD: SIP–VoIP anomaly detection using a stateful rule tree
D Seo, H Lee, E Nuwere - Computer Communications, 2013 - Elsevier
Voice over IP (VoIP) services have become prevalent lately because of their potential
advantages such as economic efficiency and useful features. Meanwhile, Session Initiation …
advantages such as economic efficiency and useful features. Meanwhile, Session Initiation …
[PDF][PDF] Multilayer secured SIP based VoIP architecture
VoIP faces many emerging attacks and threats. securing SIP based VoIP is a major
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …
challenging task, hence confidentiality, integrity, availability, as well as authenticity must be …
Design and implementation of SIP-aware DDoS attack detection system
SIP is a signaling protocol used for establishing, modifying, terminating sessions in
multimedia services such as VoIP, instant messaging, and video conferencing. Existing IP …
multimedia services such as VoIP, instant messaging, and video conferencing. Existing IP …
Threat-Specific Risk Assessment for IP Multimedia Subsystem Networks Based on Hierarchical Models
AE Shaikh, SY Enoch - arxiv preprint arxiv:2501.09936, 2025 - arxiv.org
Over the years, IP Multimedia Subsystems (IMS) networks have become increasingly critical
as they form the backbone of modern telecommunications, enabling the integration of …
as they form the backbone of modern telecommunications, enabling the integration of …