Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…Moreover, there are a variety of known attacks against VoIP systems, e.g., denial of service attacks [37] and billing attacks [38]. We refer to [10] for a recent survey on such attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, there are a variety of known attacks against VoIP systems, e.g., denial of service attacks [37] and billing attacks [38]. We refer to [10] for a recent survey on such attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In VoIP, SIP is used to not only set up a session but also establish a secure communication. As SIP plays an integral role in current and future real time communication networks, protection of SIP networks from different types of attacks is crucial for VoIP security [18][19]. However, it is worth of noting that SIP security has the following weaknesses:…”
Section: Sip-based Secure Voip Communication Over Wmnsmentioning
confidence: 99%
“…There are several different types of attacks that are targeted to VoIP infrastructure. Some possible attacks and vulnerability exploits are shown in [5] by El-Moussa et al The paper describes denial of service attacks, which are very common in computer networks, or SPAM over internet telephony. Furthermore, the authors mention brute-force attacks against authentication mechanism, which are somewhat similar to the prefix-guessing attacks described in this paper.…”
Section: Related Workmentioning
confidence: 99%