2

[ X.693 (2015) Corrigendum 1 (10/17) ] -




2

[ X.696 (2015) Corrigendum 2 (10/17) ] -




2

[ X.609.5 (01/18) ] - Managed P2P communications: Multimedia streaming overlay management protocol

Managed P2P communications: Multimedia streaming overlay management protocol




2

[ X.609.4 (01/18) ] - Managed P2P communications: Multimedia streaming peer protocol

Managed P2P communications: Multimedia streaming peer protocol




2

[ X.1276 (05/18) ] - Authentication step-up protocol and metadata Version 1.0

Authentication step-up protocol and metadata Version 1.0




2

[ X.1500 (2011) Amendment 12 (03/18) ] - Revised structured cybersecurity information exchange techniques

Revised structured cybersecurity information exchange techniques




2

[ X.Sup26 (2016) Corrigendum 1 (03/18) ] -




2

[ X.1080.0 (2017) Corrigendum 1 (03/18) ] -




2

[ X.1214 (03/18) ] - Security assessment techniques in telecommunication/information and communication technology networks

Security assessment techniques in telecommunication/information and communication technology networks




2

[ X.1051 (2016) Corrigendum 1 (09/17) ] -




2

[ X.682 (2015) Corrigendum 2 (05/18) ] -




2

[ X.681 (2015) Corrigendum 1 (05/18) ] -




2

[ X.696 (2015) Corrigendum 3 (05/18) ] -




2

[ X.683 (2015) Corrigendum 1 (05/18) ] -




2

[ X.680 (2015) Corrigendum 3 (05/18) ] -




2

[ X.1278 (11/18) ] - Client to authenticator protocol/Universal 2-factor framework

Client to authenticator protocol/Universal 2-factor framework




2

[ X.1277 (11/18) ] - Universal authentication framework

Universal authentication framework




2

[ X.680 (2015) Amendment 1 (05/18) ] - Relaxing IMPORTS clause to allow importation of definitions from new versions of a given module

Relaxing IMPORTS clause to allow importation of definitions from new versions of a given module




2

[ X.609.6 (12/18) ] - Managed P2P communications: Content distribution signalling requirements

Managed P2P communications: Content distribution signalling requirements




2

[ X.609.7 (12/18) ] - Managed P2P communications: Content distribution peer protocol

Managed P2P communications: Content distribution peer protocol




2

[ X.1249 (01/19) ] - Technical framework for countering mobile in-application advertising spam

Technical framework for countering mobile in-application advertising spam




2

[ X.1215 (01/19) ] - Use cases for structured threat information expression

Use cases for structured threat information expression




2

[ X.894 (2018) Corrigendum 1 (03/19) ] -




2

[ X.Sup27 (09/16) ] - ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso

ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso




2

[ X.Sup28 (09/16) ] - ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)

ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)




2

[ X.Sup29 (09/17) ] - ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks

ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks




2

[ X.Sup33 (09/18) ] - ITU-T X.1231 - Supplement on technical framework for countering telephone service scams

ITU-T X.1231 - Supplement on technical framework for countering telephone service scams




2

[ X.Sup32 (03/18) ] - ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations

ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations




2

[ X.1042 (01/19) ] - Security services using software-defined networking

Security services using software-defined networking




2

[ X.1197 (2012) Amendment 1 (09/19) ] -




2

[ Q.1912.5 (2018) Erratum 1 (11/19) ] -




2

[ Q.1912.5 (2018) Corrigendum 1 (07/18) ] -




2

[ Q.1912.5 (01/18) ] - Interworking between session initiation protocol (SIP) and bearer independent call control protocol or ISDN user part

Interworking between session initiation protocol (SIP) and bearer independent call control protocol or ISDN user part




2

[ Q.3642 (04/19) ] - IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability

IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability




2

[ Q.4014.2 (04/19) ] - PSTN/ISDN terminal equipment using IP multimedia core network subsystem; Conformance testing - Part 2: Test suite structure and test purposes

PSTN/ISDN terminal equipment using IP multimedia core network subsystem; Conformance testing - Part 2: Test suite structure and test purposes




2

[ Q.4042.1 (12/18) ] - Cloud interoperability testing for web applications - part 1: Interoperability testing between the CSC and CSP

Cloud interoperability testing for web applications - part 1: Interoperability testing between the CSC and CSP




2

[ Q.761 (12/99) ] - Signalling System No. 7 - ISDN User Part functional description

Signalling System No. 7 - ISDN User Part functional description




2

[ Q.767 (02/91) ] - Application of the ISDN User Part of CCITT signalling system No. 7 for international ISDN interconnections

Application of the ISDN User Part of CCITT signalling system No. 7 for international ISDN interconnections




2

[ Q.764 (12/99) ] - Signalling System No. 7 - ISDN User Part signalling procedures

Signalling System No. 7 - ISDN User Part signalling procedures




2

[ Q.763 (12/99) ] - Signalling System No. 7 - ISDN User Part formats and codes

Signalling System No. 7 - ISDN User Part formats and codes




2

[ Q.5021 (07/19) ] - Protocol for managing capability exposure APIs in IMT-2020 networks

Protocol for managing capability exposure APIs in IMT-2020 networks




2

[ Q.Sup71 (10/19) ] - Testing methodologies of Internet related performance measurements including e2e bit rate within the fixed and mobile operators' networks

Testing methodologies of Internet related performance measurements including e2e bit rate within the fixed and mobile operators' networks




2

[ Q.3644 (12/19) ] - Requirements for signalling network analyses and optimization in VoLTE

Requirements for signalling network analyses and optimization in VoLTE




2

[ Q.3056 (12/19) ] - Signalling procedures of the probes to be used for remote testing of network parameters

Signalling procedures of the probes to be used for remote testing of network parameters




2

[ Q.3055 (12/19) ] - Signalling protocol for heterogeneous Internet of things gateways

Signalling protocol for heterogeneous Internet of things gateways




2

[ Q.3916 (12/19) ] - Signalling requirements and architecture for the Internet service quality monitoring system

Signalling requirements and architecture for the Internet service quality monitoring system




2

[ Q.5002 (12/19) ] - Signalling requirements and architecture for media service entity attachment

Signalling requirements and architecture for media service entity attachment




2

[ Q.5051 (03/20) ] - Framework for combating the use of stolen mobile devices

Framework for combating the use of stolen mobile devices




2

[ Q.3719 (12/19) ] - Signalling requirements for the separation of control plane and user plane in a virtualized broadband network gateway (vBNG)

Signalling requirements for the separation of control plane and user plane in a virtualized broadband network gateway (vBNG)




2

[ Q.3057 (04/20) ] - Signalling requirements and architecture for interconnection between trustable network entities

Signalling requirements and architecture for interconnection between trustable network entities