| ||
Baset, Salman A. and Henning Schulzrinne. "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol." http://www1.cs. columbia .edu/~salman/ publications /skype1_4.pdf
Berson, Tom. "Skype Security Evaluation." http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
Mahendra, Prasad. "A Quick Analysis of the Gizmo Project's Integration with Asterisk." http://karlsbakk.net/asterisk/gizmo-project.php
Nucci, Antonio. " Skype Detection: Traffic Classification in the Dark ." Converge: Network Digest . http://www.convergedigest.com/bp-c2p/bp1.asp?ID=373&ctgy=2
Schmidt, Greg. "Skype's Impact on Enterprise Security." April 2006. http://www.voip-magazine.com/content/view/2783/0/1/1/
Sheppard, Andrew. Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service . Sebastopol: O'Reilly, 2005
Skype: Guide for Network Administrators . http://www.skype.com/security/guide-for-network-admins.pdf
"Skype Protocol Has Been Cracked." http://www.voipwiki.com/blog/?p=16
Tolly, Kevin. " Skype: Hazardous to Network Health? " Computerworld . 3 October, 2005. http://computerworld.co.nz/news.nsf/UNID/A5276B531C8250CDCC25708E00381F98