Login / Signup
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Hossen A. Mustafa
Wenyuan Xu
Ahmad-Reza Sadeghi
Steffen Schulz
Published in:
DSN (2014)
Keyphrases
</>
malicious activities
countermeasures
network intrusion detection systems
identity theft
ddos attacks
malicious attacks
computer security
case study
security threats
detecting malicious
security issues
personal information
watermarking method
intrusion detection system
data mining
data sets
real time