Login / Signup
Employing penetration testing as an audit methodology for the security review of VoIP: Tests and examples.
Theodore Tryfonas
Iain Sutherland
Ioannis Pompogiatzis
Published in:
Internet Res. (2007)
Keyphrases
</>
penetration testing
security vulnerabilities
intrusion detection
information security
data mining
data mining techniques
access control
network security
security requirements
security analysis
anomaly detection
quality of service
network traffic
dos attacks
customer data