Research Paper On Voip

  • 1.

    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP:Session Initiation Protocol. IETF RFC 3261 (June 2002)Google Scholar

  • 2.

    Gupta, P., Shmatikov, V.: Security Analysis of Voice-over-IP Protocols. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 49–63 (July 2007)Google Scholar

  • 3.

    Feng, C., Malik, S.: Vulnerability Analysis and best practices for adopting IP telephony in critical infrastructure sectors. IEEE Communication Magazine (2006)Google Scholar

  • 4.

    NIST SP 800-58, Security Consideration for Voice Over IP Systems Google Scholar

  • 5.

    Rosenberg, J., Schulzrinne, H., Camarillo, G., et al.: SIP:Session initiation protocol [EB/OL] [S.L]. IETF, vol. 6 (2002)Google Scholar

  • 6.

    Lippmann, R.P., Cunningham, R.K.: Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks. Computer Networks-the International Journal of Computer and Telecommunica-tions Networking 34(4), 597–603 (2000)Google Scholar

  • 7.

    ITU-T RFC 3015 Megaco Protocol Version 1.0. [S] (November 2000) Google Scholar

  • 8.

    ITU-T RFC 3525 Gateway Control Protocol Version 1.[S] (June 2003)Google Scholar

  • Сьюзан поднялась на верхнюю ступеньку лестницы. Она не успела постучать, как заверещал электронный дверной замок. Дверь открылась, и коммандер помахал ей рукой. - Спасибо, что пришла, Сьюзан. Я тебе очень благодарен.

    0 Replies to “Research Paper On Voip”

    Lascia un Commento

    L'indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *