Login / Signup
VoIP Malware: Attack Tool & Attack Scenarios.
Mohamed Nassar
Radu State
Olivier Festor
Published in:
ICC (2009)
Keyphrases
</>
attack scenarios
attack detection
intrusion detection system
alert correlation
attack graphs
intrusion detection
multistage
neural network
computer networks
network security
response time
quality of service