Login / Signup

VoIP Malware: Attack Tool & Attack Scenarios.

Mohamed NassarRadu StateOlivier Festor
Published in: ICC (2009)
Keyphrases
  • attack scenarios
  • attack detection
  • intrusion detection system
  • alert correlation
  • attack graphs
  • intrusion detection
  • multistage
  • neural network
  • computer networks
  • network security
  • response time
  • quality of service