Login / Signup

Exploiting IP telephony with silence suppression for hidden data transfers.

Sabine S. SchmidtWojciech MazurczykRadoslaw KuleszaJörg KellerLuca Caviglione
Published in: Comput. Secur. (2018)
Keyphrases