1J. Fiedler, VoIP Defender: Highly Scalable SIP-based Security Architecture, Available online at: http://mediatools.cs.ucl.ac.uk/nets/dos/export/1-441/sip/... /voipdefender.pdf.
2SIP: Session Initiation Protocol, Available online at: ftp://ftp.isi.edu/in-notes/rfc2543.txt, 1999.
3Y. Ling, Y. Gu, G.Y. Wei, Detect SYN flooding attack in edge routers, International Journal of Security and Its Applications 3 (2009).
4V. Jacobson, M.J. Karels, Congestion avoidance and control, Proc. ACM SIGCOMM '88, 1988. pp. 314-329.
5H. Sengar, H. Wang, D. Wijesekera, S. Jajodia, Detecting VoIP floods using the hellinger distance, IEEE Transactions on Parallel and Distributed Systems 19 (2008).
6D. Pollard, Asymptopia, first ed. book in progress, Available online at: http://www.stat.yale.edu/pollard/, 2000.