Login / Signup

A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications.

Muhammad SherThomas Magedanz
Published in: Comput. Networks (2007)
Keyphrases
  • information security
  • information systems
  • security issues
  • risk analysis
  • response time
  • network management
  • security mechanisms
  • security problems