Login / Signup
Attacking and Protecting Network Printers and VoIP Phones alike.
Giampaolo Bella
Pietro Biondi
Stefano Bognanni
Published in:
CoRR (2022)
Keyphrases
</>
network architecture
complex networks
peer to peer
network model
network design
imaging devices
data sets
sensor networks
access control
packet loss
network resources
network size