Login / Signup

Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure.

Yu-Han LuChi-Yu LiYao-Yu LiSandy Hsin-Yu HsiaoTian XieGuan-Hua TuWei-Xun Chen
Published in: MobiCom (2020)
Keyphrases
  • dos attacks
  • e learning
  • distributed systems
  • intelligent systems
  • denial of service