Login / Signup
An XML-based testing strategy for probing security vulnerabilities in the diameter protocol.
Daping Wang
Published in:
Bell Labs Tech. J. (2007)
Keyphrases
</>
security vulnerabilities
penetration testing
security properties
lightweight
intrusion detection
software development
access control
computer networks