Login / Signup
Trapping and analyzing malicious VoIP traffic using a honeynet approach.
Markus Gruber
Florian Fankhauser
Stefan Taber
Christian Schanes
Thomas Grechenig
Published in:
ICITST (2011)
Keyphrases
</>
network traffic
real time
packet loss
network architecture
malicious behavior
road network
traffic flow
internet traffic
malicious attacks
malicious activities