Login / Signup

Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation.

Ryan FarleyXinyuan Wang
Published in: SecureComm (2013)
Keyphrases
  • countermeasures
  • computer systems
  • information security
  • computer technology
  • neural network
  • machine learning
  • artificial intelligence
  • search engine
  • information systems
  • case study
  • search algorithm
  • risk management