Login / Signup
Detecting VoIP fuzzing attacks by using a honeypot system.
H. Hakan Kilinc
Ugur Cagal
Published in:
SIU (2017)
Keyphrases
</>
network intrusion detection systems
digital watermark
countermeasures
malicious attacks
intrusion detection
network architecture
malicious activities
automatic detection
packet loss
detecting malicious
watermarking scheme
security threats
detect malicious