Security Challenge and Defense in VoIP Infrastructures.
David ButcherXiangyang LiJinhua GuoPublished in: IEEE Trans. Syst. Man Cybern. Part C (2007)
Keyphrases
- network security
- intrusion detection
- cyber defense
- ip networks
- information security
- critical infrastructure
- voice over internet protocol
- security problems
- intrusion detection system
- defense mechanisms
- security policies
- security level
- cyber security
- security threats
- security issues
- data management
- statistical databases
- computer security
- information systems
- information warfare
- neural network
- computer virus
- security systems
- database security
- security protocols
- key management
- security requirements
- network traffic
- computer systems
- data mining techniques
- response time