Author of the publication

Survey of network security systems to counter SIP-based denial-of-service attacks.

, , and . Computers & Security, 29 (2): 225-243 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey of security vulnerabilities in session initiation protocol., , , , , , and . IEEE Communications Surveys and Tutorials, 8 (1-4): 68-81 (2006)Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks., , and . IJSN, 4 (3): 189-200 (2009)A SPIT Detection Mechanism Based on Audio Analysis., , and . MobiMedia, ICST, (2008)Increasing SIP firewall performance by ruleset size limitation., , and . PIMRC, page 1-6. IEEE, (2008)Revealing the Calling History of SIP VoIP Systems by Timing Attacks., , , and . ARES, page 135-142. IEEE Computer Society, (2009)Denial-of-service detection and mitigation for SIP communication networks.. Berlin Institute of Technology, (2009)Two layer Denial of Service prevention on SIP VoIP infrastructures., , , , , , and . Computer Communications, 31 (10): 2443-2456 (2008)Blocking attacks on SIP VoIP proxies caused by external processing., , and . Telecommunication Systems, 45 (1): 61-76 (2010)A First Order Logic Security Verification Model for SIP., , , , and . ICC, page 1-6. IEEE, (2009)Denial of service attacks targeting a SIP VoIP infrastructure: attack scenarios and prevention mechanisms., , and . IEEE Network, 20 (5): 26-31 (2006)