Sign in

Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors.

Feng CaoSaadat Malik
Published in: IEEE Commun. Mag. (2006)
Keyphrases