A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Clues in tweets: Twitter-guided discovery and analysis of SMS spam

S Tang, X Mi, Y Li, XF Wang, K Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
With its critical role in business and service delivery through mobile devices, SMS (Short
Message Service) has long been abused for spamming, which is still on the rise today …

[PDF][PDF] A comprehensive review on VoIP over Wireless LAN networks

H Kazemitabar, S Ahmed, K Nisar… - Computer Science …, 2010 - scholar.archive.org
Abstract Voice over Internet Protocol (VoIP) is one of the most important technologies in the
world of communication. Around 20 years of research on VoIP, some Quality of Service …

A machine learning framework towards bank telemarketing prediction

SCK Tékouabou, ŞC Gherghina, H Toulni… - Journal of Risk and …, 2022 - mdpi.com
The use of machine learning (ML) methods has been widely discussed for over a decade.
The search for the optimal model is still a challenge that researchers seek to address …

Perverse effects in defense of computer systems: When more is less

J Wolff - Journal of Management Information Systems, 2016 - Taylor & Francis
With computer security spending on the rise, organizations seem to have accepted the
notion that buying more—and more expensive—defenses allows them to better protect their …

A survey of voice over IP security research

AD Keromytis - International Conference on Information Systems …, 2009 - Springer
We present a survey of Voice over IP security research. Our goal is to provide a roadmap for
researchers seeking to understand existing capabilities and, and to identify gaps in …

Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP

M Nikooghadam, H Amintoosi - The Journal of supercomputing, 2020 - Springer
With the advent of the internet, Voice over Internet Protocol (VoIP) has obtained a
considerable amount of attention due to its low cost, and ease of implementation. Similar to …

The impact of TLS on SIP server performance: Measurement and modeling

C Shen, E Nahum, H Schulzrinne… - IEEE/ACM Transactions …, 2012 - ieeexplore.ieee.org
Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. A key
component of this is securing the signaling path, which is performed by the Session Initiation …

[PDF][PDF] A survey on voice over ip over wireless lans

H Kazemitabar, S Ahmed, K Nisar, AB Said… - International Journal of …, 2010 - csd.uoc.gr
Voice over Internet Protocol (VoIP) is a form of voice communication that uses audio data to
transmit voice signals to the end user. VoIP is one of the most important technologies in the …

Verifying authenticity of voice mail participants in telephony networks

C Gustave, S Chow, SL Chen - US Patent 8,516,259, 2013 - Google Patents
A method includes receiving an authentication certificate of a voice mail account holder
and/or an authentication certificate of a caller wanting to leave a voice mail message the …