Login / Signup
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications.
Muhammad Sher
Thomas Magedanz
Published in:
Comput. Networks (2007)
Keyphrases
</>
information security
information systems
security issues
risk analysis
response time
network management
security mechanisms
security problems