Login / Signup

Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints.

Khaled DassoukiHaïdar SafaMohamed NassarAbbas Hijazi
Published in: Comput. Secur. (2017)
Keyphrases