Login / Signup
An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain.
Vijay K. Gurbani
Andrew R. McGee
Published in:
Bell Labs Tech. J. (2007)
Keyphrases
</>
security mechanisms
information security
security issues
network connection
email
intrusion detection
domain specific
software architecture
countermeasures
internet users
security vulnerabilities
enterprise network