Related references
Note: Only part of the references are listed.
Article
Computer Science, Hardware & Architecture
A survey on registration hijacking attack consequences and protection for session initiation protocol (SIP)
Makhdoom Muhammad Naeem et al.
COMPUTER NETWORKS (2020)
Proceedings Paper
Computer Science, Theory & Methods
A Scalable Detection Technique for Real-time Transport Protocol (RTP) Flooding Attacks in VoIP Network
G. Vennila et al.
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (2016)