VoIP: A comprehensive survey on a promising technology

S Karapantazis, FN Pavlidou - Computer Networks, 2009 - Elsevier
The Internet has burgeoned into a worldwide information superhighway during the past few
years, giving rise to a host of new applications and services. Among them, Voice over IP …

A comprehensive survey of voice over IP security research

AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …

Modeling misuse patterns

EB Fernandez, N Yoshioka… - … , Reliability and Security, 2009 - ieeexplore.ieee.org
Security patterns are now starting to be accepted by industry. Security patterns are useful to
guide the security design of systems by providing generic solutions that can stop a variety of …

Engineering secure systems: Models, patterns and empirical validation

B Hamid, D Weber - Computers & Security, 2018 - Elsevier
Several development approaches have been proposed to handle the growing complexity of
software system design. The most popular methods use models as the main artifacts to …

A survey of voice over IP security research

AD Keromytis - International Conference on Information Systems …, 2009 - Springer
We present a survey of Voice over IP security research. Our goal is to provide a roadmap for
researchers seeking to understand existing capabilities and, and to identify gaps in …

Security patterns for voice over ip networks

EB Fernandez, JC Pelaez… - … Multi-Conference on …, 2007 - ieeexplore.ieee.org
Voice over IP (VoIP) has had a strong effect on global communications by allowing human
voice and fax information to travel over existing packet data networks along with traditional …

A multi-dimensional classification for users of security patterns

M VanHilst, EB Fernandez, F Braz - Journal of Research and …, 2009 - search.informit.org
This paper presents a classification for security patterns that addresses the needs of users.
The approach uses a matrix defined by dividing the problem space along multiple …

Misuse patterns in VoIP

JC Pelaez, EB Fernandez… - Proceedings of the 14th …, 2007 - dl.acm.org
In VoIP, in order to avoid attacks and discover security vulnerabilities, it is necessary to be
aware of typical risks and to have a good understanding of how vulnerabilities can be …

Privacy and integrity preserving multi-dimensional range queries for cloud computing

F Chen, AX Liu - 2014 IFIP Networking Conference, 2014 - ieeexplore.ieee.org
In cloud computing, a cloud provider hosts the data of an organization and replies query
results to the customers of the organization. Because organization's data are confidential …

Applicability of security patterns

R Ortiz, S Moral-García, S Moral-Rubio, B Vela… - On the Move to …, 2010 - Springer
Abstract Information Security has become one of the fundamental mainstays in
organizations owing to the ever-increasing cyber attacks against them in recent years. Both …