Cited By
View all- Nedyalkov I(2024)Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP StreamsTelecom10.3390/telecom50300295:3(556-587)Online publication date: 8-Jul-2024
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM who is in the VoIP signaling and/or media path can easily wiretap, divert ...
For commercial VoIP services, billing is crucial to both service providers and their subscribers. One of the most basic requirements of any billing function is that it must be accurate and trustworthy. A reliable VoIP billing mechanism should only ...
Phone features, e.g., <em>911 call</em> , <em>voicemail</em> , and <em>Do Not Disturb</em> , are critical and necessary for all deployed VoIP systems. In this paper, we empirically investigate the security of these phone features. We have implemented a ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format