Login / Signup

Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation.

Ryan FarleyXinyuan Wang
Published in: Int. J. Crit. Infrastructure Prot. (2014)
Keyphrases