Login / Signup
Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation.
Ryan Farley
Xinyuan Wang
Published in:
SecureComm (2013)
Keyphrases
</>
countermeasures
computer systems
information security
computer technology
neural network
machine learning
artificial intelligence
search engine
information systems
case study
search algorithm
risk management