On how VoIP attacks foster the malicious call ecosystem.
Javier Carrillo MondéjarJosé Luis MartínezGuillermo Suarez-TangilPublished in: Comput. Secur. (2022)
Keyphrases
- malicious attacks
- detect malicious
- malicious users
- detecting malicious
- malicious behavior
- insider attacks
- malicious code
- malicious activities
- malicious traffic
- normal traffic
- insider threat
- network architecture
- network traffic
- quality of service
- countermeasures
- packet loss
- static analysis
- traffic analysis
- attack detection
- malicious nodes
- real time
- semi fragile watermarking
- computer viruses
- identity theft
- security threats
- computer security
- communication networks
- information security
- video coding
- anomaly detection
- wireless sensor networks
- web pages