Login / Signup
Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach.
Markus Gruber
Christian Schanes
Florian Fankhauser
Martin Moutran
Thomas Grechenig
Published in:
NSS (2013)
Keyphrases
</>
network architecture
management system
identity theft
countermeasures
real time
software architecture
anomaly detection
security protocols
data mining
digital images
intrusion detection
quality of service
dos attacks
insider threat