Detecting authentication misuse attacks against SIP entities.
Sajad PourmohseniHassan AsgharianAhmad AkbariPublished in: ISCISC (2013)
Keyphrases
- misuse detection
- countermeasures
- intrusion detection system
- detect malicious
- intrusion detection
- anomaly detection
- security mechanisms
- semi fragile watermarking
- network intrusion detection systems
- data mining
- malicious activities
- detecting malicious
- authentication and key agreement
- digital watermarking
- security issues
- security protocols
- network security
- image authentication
- watermarking scheme
- network traffic
- computer systems