A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP) - ScienceDirect
Survey of network security systems to counter SIP-based denial-of-service attacks - ScienceDirect
Utilizing bloom filters for detecting flooding attacks against SIP based services - ScienceDirect
PDF) A Comparative Study of SIP Overload Control Algorithms
Cisco Unified Communications System 9.0 SRND - Network Infrastructure [Cisco Collaboration Systems Release] - Cisco
A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach - Montazerolghaem - 2017 - International Journal of Communication Systems - Wiley Online Library
List of Metasploit Windows Exploits (Detailed Spreadsheet) - InfosecMatter
A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach - Montazerolghaem - 2017 - International Journal of Communication Systems - Wiley Online Library
A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach - Montazerolghaem - 2017 - International Journal of Communication Systems - Wiley Online Library
VOIP – Telecom R & D
Contact and Record-Route headers explained – The Smartvox Knowledgebase
Making Sense of the Metadata: Clustering 4,000 Stack Overflow tags with BigQuery k-means - Stack Overflow Blog
McAfee Enterprise Support Community - Getting "UnKnown/ Not Applicable" in the Reports g... - McAfee Enterprise Support Community
A load scheduler for SIP proxy servers: design, implementation and evaluation of a history weighted window approach - Montazerolghaem - 2017 - International Journal of Communication Systems - Wiley Online Library