Login / Signup

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures.

Yu-Han LuSandy Hsin-Yu HsiaoChi-Yu LiYi-Chen HsiehPo-Yi ChouYao-Yu LiTian XieGuan-Hua Tu
Published in: IEEE/ACM Trans. Netw. (2023)
Keyphrases
  • countermeasures
  • information security
  • security measures
  • cyber attacks
  • java card
  • rural areas
  • power analysis
  • e learning
  • computer systems
  • databases
  • distributed systems
  • security issues
  • security breaches