Login / Signup
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.
Yu-Han Lu
Sandy Hsin-Yu Hsiao
Chi-Yu Li
Yi-Chen Hsieh
Po-Yi Chou
Yao-Yu Li
Tian Xie
Guan-Hua Tu
Published in:
IEEE/ACM Trans. Netw. (2023)
Keyphrases
</>
countermeasures
information security
security measures
cyber attacks
java card
rural areas
power analysis
e learning
computer systems
databases
distributed systems
security issues
security breaches