Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access.
Ruth S. GaydeStinson S. MathaiKevin WangPublished in: Bell Labs Tech. J. (2007)
Keyphrases
- network security
- computer networks
- traffic analysis
- network administrators
- network traffic
- wifi
- network access
- ip networks
- security protection
- packet filtering
- network architecture
- access points
- dos attacks
- intrusion detection
- network attacks
- situation assessment
- intrusion detection system
- network monitoring
- security policies
- network management
- voice over internet protocol
- wireless technologies
- ip multimedia subsystem
- wireless networks
- information security
- anomaly detection
- location information
- wireless communication
- mobile devices
- communication networks
- end to end
- computer systems
- wireless sensor
- real time
- mobile phone
- ad hoc networks
- mobile networks
- multimedia services
- sensor data
- peer to peer
- semi supervised
- e learning
- neural network
- smart phones