Login / Signup

The SIP-Based System Used in Connection with a Firewall.

Peter KoskiJorma YlinenPekka Loula
Published in: AICT/ICIW (2006)
Keyphrases
  • intrusion detection
  • network security
  • network traffic
  • authentication and key agreement
  • intrusion detection system
  • security enforcement
  • database
  • information retrieval
  • data structure
  • smart card