Login / Signup
Hacking VoIP.
Yannis Soupionis
Dimitris Gritzalis
Published in:
Comput. Secur. (2013)
Keyphrases
</>
quality of service
penetration testing
packet loss
ip networks
intelligence and security informatics
network architecture
genetic algorithm
databases
social networks
voice over ip
artificial neural networks
security threats
neural network model
security analysis
response time
website
data mining