Login / Signup
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.
Ruishan Zhang
Xinyuan Wang
Ryan Farley
Xiaohui Yang
Xuxian Jiang
Published in:
AsiaCCS (2009)
Keyphrases
</>
malicious attacks
ddos attacks
countermeasures
traffic analysis
injection attacks
real time
security threats
security protocols
neural network
ip networks
network architecture
watermarking scheme
computer security
packet loss
java card
quality of service
security risks
digital images
malicious users
database systems